EST enrollment of application certificates using CLI
Ensure
IDEVID
certificate is present in the switch.Add
IDEVID
root certificate to the trusted certificate list of the EST server.Add EST server root certificate to the switch TA profile.
Synchronize time between the switch and the EST server.
Manually configure EST server profile such as profile name, server URL, retry interval, retry count, and authorization mechanism. The switch connects with EST server through the configured URL.
To configure the EST server, see Configuration commands.
Create a TA profile, certificate name with CSR attributes, and initiate enrollment, using following command:
crypto pki enroll-est-cert <profile-name> certificate-name <cert-name> ta-profile <ta-profile-name> key-type usage subject
NOTE:The entered CSR attributes are stored in the configuration records.
The switch sends
GET/cacerts
request to the EST server. CA certificate sent by the server is installed in the switch with the TA profile created in step 2.Installed
IDEVID
certificates establish mutual TLS session between the switch and the EST server.If a client tries to access the EST server database without authentication, the switch displays the
401 unauthorized access
error withnonce
,qop
, andrealm
messages.
Generate CSR and send
POST/simpleenroll
request to EST server.Validate that the certificate is signed with CA certificate installed in step 2.
Install the application certificate with certificate name configured in step 2.