Cisco Systems 6500 manual Client-cert pem

Page 62

Chapter 2 Commands for the Catalyst 6500 Series SSL Services Module

policy http-header

SSL Session—Session headers, including the session ID, are used to cache client certificates that are based on the session ID. The session headers are also cached on a session basis if the server wants to track connections that are based on a particular cipher suite. When you specify session, the SSL Services Module passes information specific to an SSL connection to the back-end server in the form of the following session headers.

Field to insert

Description

 

 

Session-Id

The SSL session ID

 

 

Session-Cipher-Name

The symmetric cipher suite

 

 

Session-Cipher-Key-Size

The symmetric cipher key size

 

 

Session-Cipher-Use-Size

The symmetric cipher use size

 

 

Session-Step-Up

TRUE if the server presented a stepup certificate

 

and the client renegotiated the cipher; otherwise

 

FALSE

 

 

Session-Initial-Cipher-Name

If Session-Step-Up is TRUE, the initially

 

negotiated cipher name

 

 

Session-Initial-Cipher-Key-Size

If Session-Step-Up is TRUE, the initially

 

negotiated cipher’s key size

 

 

Session-Initial-Cipher-Use-Size

If Session-Step-Up is TRUE, the initially

 

negotiated cipher’s use size

 

 

Table 2-3lists the commands available in HTTP header insertion configuration submode.

Table 2-3 HTTP Header Insertion Configuration Submode Command Descriptions

Syntax

Description

 

 

alias user-defined-name

Specifies the alias name of the header.

standard-name

Note You can configure only one alias per standard name. You cannot

 

 

configure the same alias name for multiple standard names.

 

 

client-cert [pem]

Allows the back-end server to see the attributes of the client certificate

 

that the SSL module has authenticated and approved.

 

Note You can insert the headers listed below by entering the

 

client-certcommand, or you can send the entire client

 

certificate in PEM format by entering the client-cert pem

 

command.

 

Note The client certificate headers, or the client certificate in PEM

 

format, are inserted only if the policy’s service is configured for

 

client authentication. The root CA and intermediate CA

 

certificates will not be inserted the when client certificate is

 

inserted in the HTTP header.

 

 

Catalyst 6500 Series Switch SSL Services Module Command Reference

2-36

OL-9105-01

 

 

Image 62
Contents Corporate Headquarters Text Part Number OL-9105-01Page N T E N T S IiiNatpool Acronyms A-1 OL-9105-01 Related Documentation AudienceOrganization Chapter Title DescriptionBoldface font ConventionsConvention Description Example, interface interface typeObtaining Documentation Cisco.comDocumentation Feedback Cisco Product Security OverviewReporting Security Problems in Cisco Products Obtaining Technical AssistanceSubmitting a Service Request XiiObtaining Additional Publications and Information XiiiXiv Getting Help This chapter includes the following sectionsHow to Find Command Options Command Comment After you enter the mode keyword Must enter next on the command lineMode keyword Complete the command. If additionalConfigure terminal privileged Exec Understanding Command ModesCommand Mode Access Method Prompt Exit Method Configure terminalImage using the boot system flash filename Using the No and Default Forms of CommandsInterface command With an interfaceUsing the CLI String Search Character Special MeaningAbcdABCD \$ \ \+Aeiou DA-DBa?b Telebit 3107 v32bisCharacter This string matches any number of asterisksAbcd Za-z0-9+Codex telebit $\.121300$ 1300space space1300 1300, ,1300, 1300 ,1300 For example1300 WithOL-9105-01 A P T E R Clear ssl-proxy conn DefaultsCommand Modes Command History Release ModificationClear ssl-proxy content Defaults Command Modes Command HistoryClear ssl-proxy session Usage GuidelinesClear ssl-proxy stats Ssl-proxy#clear ssl-proxy stats Des Crypto pki export pemTerminal 3desRelated Commands Crypto pki import pemExportable Defaults Command HistoryCrypto pki import pem Usage-keysCrypto pki export pem Crypto pki export pkcs12 This example shows how to export a PKCS12 file using SCP Crypto pki import pkcs12 Crypto This example shows how to import a PKCS12 file using SCPFilename TP2? /users/admin-1/pkcs12/TP2.p12 Passphrase passphrase Crypto key decrypt rsaName key-name Crypto key encrypt rsaCrypto key lock rsa Crypto key encrypt rsaCrypto key decrypt rsa Optional Specifies that the key can be exported Crypto key export rsa pemKeylabel Name of the key Key nametest-keys UsageGeneral Purpose Key Null-Imports from the null file system Crypto key import rsa pemInstead of one general-purpose key pair System-Imports from the system file systemPEM-formatted RSA key to the SSL Services Module Name key-name Optional Name of the key Crypto key lock rsaCrypto key lock rsa name key-namepassphrase passphrase Passphrase passphraseCrypto key unlock rsa Crypto key unlock rsa name key-namepassphrase passphraseDebug ssl-proxy Command History Release Modification This example shows how to turn on App debugging Configuration mode Do commandCommand EXEC-level command to be executed Syntax Description Syntax Description Defaults Command Modes Command HistoryInterface ssl-proxy Standby timers Standby authenticationStandby delay minimum reload Standby ipSsl-proxy config# interface ssl-proxy Ssl-proxyconfig-subif#ip address 208.59.100.18Natpool Context subcommand modeThis example shows how to define a pool of IP addresses Natpool nat-pool-name startipaddr endipaddr netmask netmaskInterval seconds Syntax Description Defaults Command ModesPolicy health-probe tcp Failed-interval secondsSsl-proxyconfig-context#policy health-probe tcp probe1 Open-timeout secondsSsl-proxyconfig#ssl-proxy context ssl Running on server IP addressPage Alias Policy http-headerClient-cert pem Policy that is applied to the payloadField To Insert Description Client-cert pem Inserts the custom-stringheader into the Http header Client-ip-portCustom custom-string PrefixRelated Commands show ssl-proxy policy SSL-OFFLOAD-SOFTWARE VERSION3.11Timeout session timeout absolute Close-protocol is disabledSession-caching is enabled Policy sslSSL-Policy Configuration Submode Command Descriptions Help Renegotiation volume sizeTimeout handshake timeout Renegotiation interval timeOL-9105-01 This example shows how to enable a session cache This example shows how to disable a session cacheOL-9105-01 Policy tcp No timeout fin-wait timeout-in-seconds Delayed-ack-threshold delayDelayed-ack-timeout timer No timeout inactivity timeout-in-secondsNo tos carryover No timeout reassembly timeForm of this command to return to the default setting Server to client connection, the server connection must beSsl-proxy config-ctx-tcp-policy# mss Policy url-rewrite Ssl-proxyconfig-context#ssl-proxy policy url-rewrite test1 RedirectonlyCa-pool-name Certificate authority pool name Pool caPool ca ca-pool-name Service Inservice Authenticate verify all signature-onlyDefault certificate inservice nat server Certificate rsa general-purpose trustpointVlan vlan Virtual policy ssl ssl-policy-nameVirtual policy tcp Related Commands show ssl-proxy service Service client Policy health-probe tcp Policy http-headerVirtual policy tcp Nat server client natpool-nameVirtual policy ssl ssl-policy-name Vlan vlanSsl-proxy config-ctx-ssl-proxy# server policy tcp tcppl1 Policy tcp Show interfaces ssl-proxyShow interfaces ssl-proxy 0.subinterface Show ionterfacesShow ssl-proxy buffers This command has no default settingsShow ssl-proxy buffers Ssl-proxy#show ssl-proxy buffersSpecific proxy service Show ssl-proxy certificate-history service nameService name Show ssl-proxy certificate-historySsl-proxy# show ssl-proxy certificate-history Record 1, Timestamp000051, 163634 UTC Oct 31Related Commands service Local Show ssl-proxy conn4tuple RemoteContext name Module module Ssl-proxy#show ssl-proxy conn200.200.1438814 58796 Show ssl-proxy context name Context DefaultShow ssl-proxy context Name Optional Name of the contextBrief Show ssl-proxy crash-infoShow ssl-proxy crash-info brief details DetailsStack top Printing 1024 bytes from stack top Ssl-proxy#show ssl-proxy crash-info briefSsl-proxy#show ssl-proxy mac address Show ssl-proxy mac addressShow ssl-proxy mac address Context name Show ssl-proxy natpoolShow ssl-proxy natpool namecontext name NatpoolHttp-header Show ssl-proxy policyHealth-probe tcp Url-rewriteSsl-proxy#show ssl-proxy policy ssl ssl-policy1 Ssl-proxy#show ssl-proxy policy tcp tcp-policy1Ssl-proxy#show ssl-proxy policy health-probe tcp tcp-health Ssl-proxy#show ssl-proxy service Show ssl-proxy serviceShow ssl-proxy service namecontext name Ssl-proxy#show ssl-proxy service S6Service client Show ssl-proxy stats type ContentShow ssl-proxy stats Stats This example shows how to display the TCP statistics This example shows how to display the PKI statisticsSsl-proxy# show ssl-proxy stats hdr This example shows how to display context statisticsSsl-proxy#show ssl-proxy stats context Context name Default This example shows how to display content statistics Ssl-proxy#show ssl-proxy stats contentShow ssl-proxy status Show ssl-proxy statusShow ssl-proxy status fdu ssl tcp TCP cpu is alive Ssl-proxy#show ssl-proxy version Show ssl-proxy versionShow ssl-proxy version Debug Show ssl-proxy vlanShow ssl-proxy vlan vlan-iddebugmodule module Optional Displays debug informationSnmp-server enable Defaults Command Modes Command History ExamplesSsl-proxy context name No ssl-proxy context name Command Purpose and Guidelines DefaultsSsl-proxy context Description descriptionPolicy url-rewrite policy-name Policy ssl policy-namePolicy tcp policy-name Pool ca nameSsl-proxy crypto selftest Seconds Global configurationThis example shows how to start a cryptographic self-test Time-intervalSsl-proxy config# ssl-proxy mac address 00e0.b0ff.f232 This example shows how to configure a MAC addressRelated Commands show ssl-proxy mac address Ssl-proxy mac addressSsl-proxy pki Related Commands show ssl-proxy stats This example shows how to specify the cache sizeThis example shows how to enable PKI event-history Ssl-proxy crypto key unlock rsa Key-name Name of the key Passphrase Pass phraseSsl-proxy ip-frag-ttl Time is 6 seconds Global configurationSsl-proxyconfig#ssl-proxy ip-frag-ttl Ssl-proxy ip-frag-ttl timeSsl-proxy ssl ratelimit Ssl-proxy config# ssl-proxy ssl ratelimitSsl-proxy config# no ssl-proxy ssl ratelimit Ssl-proxy ssl ratelimit No ssl-proxy ssl ratelimitStandby authentication Group-number is String is ciscoStandby delay minimum reload Min-delay is 1 second Reload-delay is 5 secondsSsl-proxyconfig-subif#standby delay minimum 30 reload Show standby delaySsl-proxyconfig#interface ssl-proxy Secondary Defaults Command Modes Command History Usage GuidelinesStandby ip Group-number isUsed by the hot standby group is learned using Hsrp 100No standby group-numbermac-address Standby mac-addressStandby group-numbermac-addressmac-address Mac-address MAC addressShow standby Ssl-proxyconfig-subif#standby 1 mac-addressThat is used in the end nodes 102103 Standby mac-refreshStandby mac-refresh seconds no standby mac-refresh Standby name group-name No standby name group-name Hsrp is disabledStandby name Group-name Name of the standby groupStandby preempt 105Clients Operation returns to the default behaviorLeaves any synchronization delay if it was configured To become the active routerNo standby group-numberpriority priority Standby priorityStandby group-numberpriority priority Group-number is Priority isThis example shows how to change the router priority 108Standby redirects 109Show standby redirect Related Commands show standbySsl-proxyconfig-subif#standby redirects timers 90 110Optional Specifies the interval in milliseconds Standby timersMsec 111112 Or comes back up Standby trackDecrement priority 113Related Commands standby preempt Router a ConfigurationRouter B Configuration 114Scope interface Standby use-biaStandby use-bia scope interface no standby use-bia On which it was entered, instead of the major interfaceStandby version 1 This example shows how to configure Hsrp versionStandby version Specifies Hsrp versionAcronym Expansion CDP CbacCCA CEFDscp DramDsap DspuIDB ICDIcmp IDPMdss MD5Mdix MFDOspf OSIOSM PAERommon RmonROM RPCSVI STPSVC TACACS+XNS Weighted round-robinWRR Xerox Network SystemOL-9105-01 Acknowledgments for Open-Source Software OL-9105-01 $ character # character privileged Exec mode promptAsterisk + plus sign Period ? command Caret IN-1IN-2 IN-3 IN-4 TCP IN-5Configuration submode User Exec mode, summary IN-6
Related manuals
Manual 20 pages 62.17 Kb Manual 112 pages 18.84 Kb Manual 262 pages 31.67 Kb