I am currently configuring trustpoints on a ISR router. The hierarchy looks like that: root --> subca --> router certificate.
I will create 2 trustpoints where the 1st will reference the root-ca and the 2nd one the subca and router certificate.
I am aware of the fact, that the chain of trust needs to be established. I check several configurations and some mentioned the command chain-validation none (for the Root-CA); chain-validation "name of upper trustpoint e.g. subca".
The question is, whether the command chain-validation ... needs to configured in order to setup a clean configuration on the router.
If you are just starting with Threat Response for the first time, use our quick start guides for Umbrella, Email Security, or Firepower. You can also check out our module configuration videos on YouTube and the in-produ...
If you own AMP for Endpoints, you can manage users within the AMP dashboard. If you have other Cisco products, you can manage users at https://castle.amp.cisco.com/my/users.
Learn more about Threat Response here, or check out other FAQs he...
Threat Response is free with selected Cisco Security products. To get access, simply go to the login page for your region - NA, EU, or APJC* - and either log in or click to create an account. You can also watch this 1 min v...
Threat Response is not a SIEM, but it can work alongside a SIEM to speed up investigations. For instance, via the browser plugins, Threat Response provides additional response capabilities directly from within the web-based interfaces of a SIEM.