10-28-2018 12:00 PM - edited 02-21-2020 09:29 PM
I have 2 routers and want to configure site to site IPSec tunnel between them by enrolling to different sub-CA trustpoints in each router. These sub-CA's have common root CA
eg:
root CA - SubCA1
root CA - SubCA2
is the hierarchy
configuration in R1:
crypto pki trustpoint SubCA1
enrollment mode ra
enrollment url http://192.168.19.160:80/certsrv/mscep/mscep.dll
usage ike
serial-number
ip-address none
subject-name cn=ROUTER3 ou=abc o=abc.net
revocation-check none
rsakeypair IPSEC_KEY
configuration in R2 :
crypto pki trustpoint SubCA2
enrollment mode ra
enrollment url http://192.168.19.161:80/certsrv/mscep/mscep.dll
usage ike
serial-number
ip-address none
subject-name cn=ROUTER4 ou=abc o=abc.net
revocation-check none
rsakeypair IPSEC_KEY
I will authenticate and enroll to each of the trustpoints in R1 and R2(I will get signed certificate and cert chain) .should I also configure trustpoint for ROOT CA and authenticate for IPSec to work ?
Solved! Go to Solution.
10-28-2018 08:47 PM
10-28-2018 08:47 PM
10-29-2018 09:30 AM
Hi,
Thank you for quick response , suppose I have
Root-CA---> Sub CA1 ----> Sub CA2
Root-CA---> Sub CA3 ----> Sub CA4
This kind of certificate chain between peers , should I authenticate Sub-CA1,root-CA in router1 and Sub-CA3,root-CA in router2 .Precisely is it enough if I just have root CA certificate or all intermediate CA's in CSR's database
11-01-2018 06:58 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide