<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Questions - crypto key zeroize rsa in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3703053#M12412</link>
    <description>&lt;P&gt;Hi John,&lt;BR /&gt;&lt;BR /&gt;Yes, using the command "crypto key zeroize rsa" will remove all keys. This affects keys marked "Storage: config" which yours are. You could use the command "crypto key zeroize rsa label XXXX" to delete a specfic key or "crypto key zerorize rsa default" for the default key. &lt;BR /&gt;&lt;BR /&gt;Sorry I don't 100% know the answers to your other questions and don't have a lab to test, hopefully someone else can help you further.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
    <pubDate>Fri, 07 Sep 2018 17:33:55 GMT</pubDate>
    <dc:creator>Rob Ingram</dc:creator>
    <dc:date>2018-09-07T17:33:55Z</dc:date>
    <item>
      <title>Questions - crypto key zeroize rsa</title>
      <link>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3702998#M12411</link>
      <description>&lt;P&gt;I would like to remove the Default-RSA-Key from my HA ASA 5525-X with FirePower, as it was only created with 1024 bits, but I have a few questions...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;If I use the command &lt;EM&gt;"crypto key zeroize rsa"&amp;nbsp;&lt;/EM&gt;will &lt;STRONG&gt;all&lt;/STRONG&gt; the keys get removed or just the default?&amp;nbsp; (I &lt;STRONG&gt;do not&lt;/STRONG&gt; want to remove the other keys.)&lt;/LI&gt;
&lt;LI&gt;When I issue this command from within an SSH session, will my session get terminated?&amp;nbsp; If so, can this be done safely from the ASDM at all?&lt;/LI&gt;
&lt;LI&gt;We have an HA A/S pair, so will this change get replicated to the standby unit or do I need to manually run this command on the standby unit as well?&lt;/LI&gt;
&lt;LI&gt;Once the default key is removed, can the existing HSN_ASA key (see below) be used for SSH sessions?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Here are my current RSA keys:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;asa/act# sh crypto key mypubkey rsa&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key pair was generated at: 08:10:21 EDT May 8 2018&lt;BR /&gt; Key name: &amp;lt;Default-RSA-Key&amp;gt;&lt;BR /&gt; Usage: General Purpose Key&lt;BR /&gt; Modulus Size (bits): 1024&lt;BR /&gt; Storage: config&lt;BR /&gt; Key Data:&lt;BR /&gt; ***&lt;BR /&gt; &lt;BR /&gt;Key pair was generated at: 14:48:38 EDT Aug 24 2018&lt;BR /&gt; Key name: HSN_ASA&lt;BR /&gt; Usage: General Purpose Key&lt;BR /&gt; Modulus Size (bits): 2048&lt;BR /&gt; Storage: config&lt;BR /&gt; Key Data:&lt;BR /&gt; ***&lt;BR /&gt; &lt;BR /&gt; Key pair was generated at: 14:57:49 EDT Aug 24 2018&lt;BR /&gt; Key name: HSN_ASA_ENC&lt;BR /&gt; Usage: Signature Key&lt;BR /&gt; Modulus Size (bits): 2048&lt;BR /&gt; Storage: config&lt;BR /&gt; Key Data:&lt;BR /&gt; ***&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key pair was generated at: 14:57:49 EDT Aug 24 2018&lt;BR /&gt; Key name: HSN_ASA_ENC&lt;BR /&gt; Usage: Encryption Key&lt;BR /&gt; Modulus Size (bits): 2048&lt;BR /&gt; Storage: config&lt;BR /&gt; Key Data:&lt;BR /&gt; ***&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Key pair was generated at: 02:45:02 EDT Sep 6 2018&lt;BR /&gt; Key name: &amp;lt;Default-RSA-Key&amp;gt;.server&lt;BR /&gt; Usage: Encryption Key&lt;BR /&gt; Modulus Size (bits): 768&lt;BR /&gt; Storage: config&lt;BR /&gt; Key Data:&lt;BR /&gt; ***&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:12:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3702998#M12411</guid>
      <dc:creator>N3t W0rK3r</dc:creator>
      <dc:date>2020-02-21T16:12:43Z</dc:date>
    </item>
    <item>
      <title>Re: Questions - crypto key zeroize rsa</title>
      <link>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3703053#M12412</link>
      <description>&lt;P&gt;Hi John,&lt;BR /&gt;&lt;BR /&gt;Yes, using the command "crypto key zeroize rsa" will remove all keys. This affects keys marked "Storage: config" which yours are. You could use the command "crypto key zeroize rsa label XXXX" to delete a specfic key or "crypto key zerorize rsa default" for the default key. &lt;BR /&gt;&lt;BR /&gt;Sorry I don't 100% know the answers to your other questions and don't have a lab to test, hopefully someone else can help you further.&lt;BR /&gt;&lt;BR /&gt;HTH&lt;/P&gt;</description>
      <pubDate>Fri, 07 Sep 2018 17:33:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3703053#M12412</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2018-09-07T17:33:55Z</dc:date>
    </item>
    <item>
      <title>Re: Questions - crypto key zeroize rsa</title>
      <link>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3704788#M12413</link>
      <description>&lt;P&gt;Thanks for your reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So if I use the command&amp;nbsp;&lt;STRONG&gt;crypto key zerorize rsa default &lt;/STRONG&gt;to remove the defualt keys, I get the following warning...&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;EM&gt;WARNING: The default RSA key pair will be removed&lt;BR /&gt;WARNING: All device digital certificates issued using these keys will also be removed and&lt;BR /&gt;the associated trustpoints may not function correctly.&lt;/EM&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How can I check to see what certificates were issued with these keys so I can assess the impact to other services once the default keys are removed?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;John&lt;/P&gt;</description>
      <pubDate>Tue, 11 Sep 2018 13:00:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/questions-crypto-key-zeroize-rsa/m-p/3704788#M12413</guid>
      <dc:creator>N3t W0rK3r</dc:creator>
      <dc:date>2018-09-11T13:00:21Z</dc:date>
    </item>
  </channel>
</rss>

