PKI EST
EST (Enrollment over Secure Transport) (RFC 7030) defines the protocol that devices use to request trusted certificate authority (CA) certificates and to enroll / re-enroll device certificates from CA services using secure channels, specifically HTTP over TLS.
Devices can be configured to request the trusted CA certificates and to request enrollment, and re-enrollment of device certificates automatically, without the need for administrator intervention, while maintaining the security and integrity of the whole enrollment process.
The switch includes an EST client implemented as a part of the PKI infrastructure.
EST usage overview
开关上的是客户需要什么profile configuration, including EST server URL and the VRF providing HTTP connection to the EST server.
At the time the URL is set in the EST profile, the switch connects to the EST server and downloads the trusted CA certificate chain. To accommodate CA certificate updates, the certificate chain is also downloaded before a certificate enrollment or re-enrollment is attempted.
-
EST supports up to:
16 EST profiles
63 trusted CA certificates downloaded from EST servers.
18 device certificates enrolled through EST services.
EST profile configuration is supported through the CLI and the REST API
PKI_EST_Profile
.CA certificate request and device certificate enrollment is supported through the CLI and the REST custom API
CertificateManager /certificate
.
Prerequisites for using EST for certificate enrollment
Establish the PKI infrastructure for you organization, with the CA chain and service ready to issue certificates. Issue a service certificate for the EST server.
Install the root CA certificate in a TA profile on the switch that will validate the EST server certificate using CLI commands crypto
pki ta-profile
andta-certificate
.Optionally, preconfigure an EST client certificate on the switch.
Make the EST server reachable from the switch. Connect the CA service(s) to the EST server. If there is a client certificate for the EST client, install the root CA certificate on the server that will validate the client certificate.
EST profile configuration
crypto pki est-profile
url vrf username password [ciphertext | plaintext ] retry-interval retry-count arbitrary-labelarbitrary-label-enrollmentarbitrary-label-reenrollmentreenrollment-lead-time
Certificate enrollment
crypto pki certificate
key-type {rsa [key-size ] | ecdsa [curve-size ]} subject [common-name ] [country ] [locality ] [org ] [org-unit ] [state ]
enroll est-profile
Certificate re-enrollment
The re-enrollment request is sent automatically to the same EST server that was used for the original enrollment.
介绍了c的开关ertificate being re-enrolled to the EST server for authentication. If the certificate has expired or authentication fails for any reason, the switch falls back to using the EST client certificate or the username and password in the EST profile, whichever is configured, and performs a new certificate enrollment.
Re-enrollment lead-time is configurable in the EST profile using CLI command
reenrollment-lead-time
. It sets the number of days before certificate expiry date that certificate re-enrollment will be initiated.
Checking EST profile and certificate configuration
show crypto pki est-profile [ ]
show crypto pki ta-profile [ ]
show crypto pki certificate [ [plaintext | pem]]
show crypto pki application
EST best practices
Ensure the following:
A time synchronization service is used on both the switch (the EST client) and the EST server.
In all CA certificates, the
Basic Constraints
field hasCA
设置为true
,pathlen
is set appropriately, andKey Usage
is set withkeyCertSign
.In all leaf certificates, the
Extended Key Usage
field is set with the appropriate purpose as follows:For server certificates, set with
serverAuth
. TheKey Usage field
has at least one ofdigitalSignature
,keyEncipherment
, orkeyAgreement
.For client certificates, set with
clientAuth
. TheKey Usage field
has at least one ofdigitalSignature
, orkeyAgreement
.
The EST server is configured to include the intermediate issuer CA certificates in the trusted CA certificate chain that the EST server sends to the switch (the EST client) upon request.