<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Device administration using certificates in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/device-administration-using-certificates/m-p/1188064#M874619</link>
    <description>&lt;P&gt;Rather then specifying SSH subnets for device administration, is it possible to use certificates instead?&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 15:09:59 GMT</pubDate>
    <dc:creator>networker99</dc:creator>
    <dc:date>2019-03-11T15:09:59Z</dc:date>
    <item>
      <title>Device administration using certificates</title>
      <link>https://community.cisco.com/t5/network-security/device-administration-using-certificates/m-p/1188064#M874619</link>
      <description>&lt;P&gt;Rather then specifying SSH subnets for device administration, is it possible to use certificates instead?&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 15:09:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/device-administration-using-certificates/m-p/1188064#M874619</guid>
      <dc:creator>networker99</dc:creator>
      <dc:date>2019-03-11T15:09:59Z</dc:date>
    </item>
    <item>
      <title>Re: Device administration using certificates</title>
      <link>https://community.cisco.com/t5/network-security/device-administration-using-certificates/m-p/1188065#M874621</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here are the basic steps for enrolling with a CA and getting an identity certificate to use for authenticating tunnels. This example shows both automatic (SCEP) enrollment and manual enrollment. For information on fields not defined in this procedure, click the Help button. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Generating a key pair for the identity certificate. The key pair is RSA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2. Creating a trustpoint. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3. Configuring an enrollment URL. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;4. Authenticating the CA. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;5. Enrolling with the CA, which places an identity certificate onto the security appliance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 31 Mar 2009 22:24:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/device-administration-using-certificates/m-p/1188065#M874621</guid>
      <dc:creator>wong34539</dc:creator>
      <dc:date>2009-03-31T22:24:09Z</dc:date>
    </item>
  </channel>
</rss>

