Example 2116 Output from the debug crypto pki transactions Command

NewYork#debug crypto pki transactions

00 : 44 : 00 :CRYPTO_PKI: Sending CA Certificate Request:

GET/certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&message=msca HTTP/1.0

10 : 04 : 22 :CRYPTO_PKI: http connection opened

10 : 04 : 23 :CRYPTO_PKI:HTTP response header:

HTTP/1.1 200 OK

Server:Microsoft-IIS/5.0

Date :Fri, 17 Nov 2000 18:50:59 GMT

Content-Length:2 693

Content-Type:application/x-x509-ca-ra-cert

Content-Type indicates we have received CA and RA certificates.

10 : 04 : 23 :CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selecl certificate status

10 : 04 : 23 :CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selecl certificate status

10 : 04 : 23 :CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US 10 : 04 : 23 :CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US 10 : 04 : 23 :CRYPTO_PKI: transaction GetCACert completed 10 : 04 : 23 :CRYPTO_PKI: CA certificate received. 10 : 04 : 23 :CRYPTO_PKI: CA certificate received. Router(config)# crypto ca enroll msca c

% Start certificate enrollment . .

% Create a challenge password. You will need to verbally provide this password to the CA Administrator in order to revoke your certificate. For security reasons your password will not be saved in the configuration. Please make a note of it. Password:

Re-enter password:

% The subject name in the certificate will be:Router.cisco.com % Include the router serial number in the subject name? [yes/no]:n % Include an IP address in the subject name? [yes/no]:n Request certificate from CA? [yes/no]:y % Certificate request sent to Certificate Authority % The certificate request fingerprint will be displayed.

% The 'show crypto ca certificate' command will also show the fingerprint. Router(config)# Fingerprint: 2CFC6265 77BA6496 3AEFCB5 0 29BC2BF2 10:04:41:CRYPTO_PKI:transaction PKCSReq completed 10:04:41:CRYPTC>_PKI:status:

10:04:41:CRYPTO_PKI:http connection opened

10:04:41:CRYPTO_PKI: received msg of 1924 bytes

10:04:41:CRYPTO_PKI:HTTP response header:

HTTP/1.1 200 OK

Server:Microsoft-IIS/5.0

Date:Fri, 17 Nov 2000 18:51:28 GMT

Content-Length:1778

Content-Type:application/x-pki-message

10:04:41:CRYPTO_PKI:signed attr:pki-message-type:

10:04:41:13 01 33

10 : 04:41:CRYPTO_PKI:signed attr:pki-status: 10:04:41:13 01 30

10:04:41:CRYPTO_PKI:signed attr:pki-recipient-nonce : 10:04:41:04 10 B4 C8 2A 12 9C 8A 2A 4A E1 E5 15 DE 22 C2 B4 FD 10 : 04:41:CRYPTO_PKI:signed attr:pki-transaction-id:

10:04:41:13 20 34 45 45 41 44 42 36 33 38 43 33 42 42 45 44 45 39 46 10:04:41:34 38 44 33 45 36 39 33 45 33 43 37 45 39 10:04:41:CRYPTO_PKI:status = 100:certificate is granted 10:04:41:CRYPTO_PKI:All enrollment requests completed.

10:04:41:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority

0 0

Post a comment