Chapter 33 Configuring Certificates
Identity Certificates Authentication
To avoid having to retrieve the same CRL from a CA repeatedly, The security appliance can store retrieved CRLs locally, which is called CRL caching. The CRL cache capacity varies by platform and is cumulative across all contexts. If an attempt to cache a newly retrieved CRL would exceed its storage limits, the security appliance removes the least recently used CRL until more space becomes available.
–Enforce next CRL
•OCSP Options
–Server
1.OCSP URL in a match certificate override rule
2.OCSP URL configured in this OCSP Options attribute
3.AIA field of remote user certificate
–Disable nonce
•Validation Policy
–Specify the type of client connections that can be validated by this
•Other Options
–Accept certificates issued by this
–Accept certificates issued by the subordinate CAs of this CA
Identity Certificates Authentication
An Identity Certificate can be used to authenticate VPN access through the security appliance. Click the SSL Settings or the IPsec Connections links on the Identity Certificates panel for additional configuration information.
The Identity Certificates Authentication panel allows you to:
•Add an Identity Certificate. See Add/Install an Identity Certificate.
•Display details of an Identity Certificate. See Show Identity Certificate Details.
•Delete an existing Identity Certificate. See Delete an Identity Certificate.
•Export an existing Identity Certificate. See Export an Identity Certificate.
•Install an Identity Certificate. See Installing Identity Certificates.
•Enroll for a certificate with Entrust. See Generate
| Cisco Security Appliance Command Line Configuration Guide |
|