<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HTTPS API - TrustSec Environment Download PKI Question in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/https-api-trustsec-environment-download-pki-question/m-p/4866769#M582668</link>
    <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1403732"&gt;@austinkuklok35&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This appears expected and the CA certificates usually last for a number of years.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/routers/ios/config/17-x/sec-vpn/b-security-vpn/m_sec-cert-enroll-pki-0.html#GUID-90D97E19-85AC-414C-B87E-C8A168358697" target="_self"&gt;Security and VPN Configuration Guide, Cisco IOS XE 17.x / Chapter: Configuring Certificate Enrollment for a PKI / Authentication of the CA&lt;/A&gt;&amp;nbsp;says,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;H3 id="GUID-90D97E19-85AC-414C-B87E-C8A168358697__GUID-BF81EFCA-2192-4DBD-8B64-C366C121BACE" class="title topictitle3"&gt;Authentication of the CA&lt;/H3&gt;
&lt;P class="title sectiontitle"&gt;&lt;SPAN&gt;The certificate of the CA must be authenticated before the device will be issued its own certificate and before certificate enrollment can occur. Authentication of the CA typically occurs only when you initially configure PKI support at your router. To authenticate the CA, issue the &lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="keyword kwd"&gt;pki&lt;/SPAN&gt; &lt;SPAN class="keyword kwd"&gt;authenticate&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;command, which authenticates the CA to your router by obtaining the self-signed certificate of the CA that contains the public key of the CA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 class="title sectiontitle"&gt;Authentication via the fingerprint Command&lt;/H4&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If a fingerprint is not preentered for a trustpoint, and if the authentication request is interactive, you must verify the fingerprint that is displayed during authentication of the CA certificate. If the authentication request is noninteractive, the certificate will be rejected without a preentered fingerprint.&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 03 Jul 2023 21:17:53 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2023-07-03T21:17:53Z</dc:date>
    <item>
      <title>HTTPS API - TrustSec Environment Download PKI Question</title>
      <link>https://community.cisco.com/t5/network-access-control/https-api-trustsec-environment-download-pki-question/m-p/4864708#M582622</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;Hello,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I am at an impasse when it comes to deploying HTTPS API for Environment Data Download.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;We have configured our Windows Sub CA with NDES which allows us to use SCEP for certificate enrollment for our trustpoint. When specifying the fingerprint of the CA the trustpoint successfully authenticates. Without the fingerprint config option the authentication request fails with a message to provide the fingerprint.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;commands used when failing.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;crypto pki trustpoint NDES1&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;enrollmet url *URL of NDES Server*&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;revocation-check crl&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;end&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;crypto authenticate NDES1&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commands used when working.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;crypto pki trustpoint NDES1&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;enrollmet url *URL of NDES Server*&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;fingerprint *Fingerprint of SubCA cert*&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;revocation-check crl&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;end&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;crypto authenticate NDES1&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;When thinking about this so that it is set it and forget it, if we were to configure certificate re-enrollment you would still need to configure the fingerprint of the CA. When that subca cert changes the fingerprint of the ca will change causing all of our switching infrastructure to no longer access the PSNs over HTTPS. We have a switching infrastructure of around ~500 devices. Is it the thought that every time your CA expires you have to manually touch every switch? or is there a configuration that I am failing to see?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;any tips or suggestions helps.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jun 2023 14:31:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/https-api-trustsec-environment-download-pki-question/m-p/4864708#M582622</guid>
      <dc:creator>austinkuklok35</dc:creator>
      <dc:date>2023-06-29T14:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: HTTPS API - TrustSec Environment Download PKI Question</title>
      <link>https://community.cisco.com/t5/network-access-control/https-api-trustsec-environment-download-pki-question/m-p/4866769#M582668</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1403732"&gt;@austinkuklok35&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This appears expected and the CA certificates usually last for a number of years.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/routers/ios/config/17-x/sec-vpn/b-security-vpn/m_sec-cert-enroll-pki-0.html#GUID-90D97E19-85AC-414C-B87E-C8A168358697" target="_self"&gt;Security and VPN Configuration Guide, Cisco IOS XE 17.x / Chapter: Configuring Certificate Enrollment for a PKI / Authentication of the CA&lt;/A&gt;&amp;nbsp;says,&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;
&lt;H3 id="GUID-90D97E19-85AC-414C-B87E-C8A168358697__GUID-BF81EFCA-2192-4DBD-8B64-C366C121BACE" class="title topictitle3"&gt;Authentication of the CA&lt;/H3&gt;
&lt;P class="title sectiontitle"&gt;&lt;SPAN&gt;The certificate of the CA must be authenticated before the device will be issued its own certificate and before certificate enrollment can occur. Authentication of the CA typically occurs only when you initially configure PKI support at your router. To authenticate the CA, issue the &lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="keyword kwd"&gt;crypto&lt;/SPAN&gt; &lt;SPAN class="keyword kwd"&gt;pki&lt;/SPAN&gt; &lt;SPAN class="keyword kwd"&gt;authenticate&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;SPAN&gt;command, which authenticates the CA to your router by obtaining the self-signed certificate of the CA that contains the public key of the CA.&lt;/SPAN&gt;&lt;/P&gt;
&lt;H4 class="title sectiontitle"&gt;Authentication via the fingerprint Command&lt;/H4&gt;
&lt;P&gt;...&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If a fingerprint is not preentered for a trustpoint, and if the authentication request is interactive, you must verify the fingerprint that is displayed during authentication of the CA certificate. If the authentication request is noninteractive, the certificate will be rejected without a preentered fingerprint.&lt;/SPAN&gt;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jul 2023 21:17:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/https-api-trustsec-environment-download-pki-question/m-p/4866769#M582668</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2023-07-03T21:17:53Z</dc:date>
    </item>
  </channel>
</rss>

