crypto ipsec transform-set BOSTON esp-3des esp-md5-hmac
crypto map VPN 10 ipsec-isakmp set peer 192.168.2.2 set transform-set BOSTON match address 101
route-map nonat permit 10 match ip address 102
ip nat inside source route-map nonat interface FastEthernet0 overload
ip route 0.0.0.0 0.0.0.0 192.168.2.2
interface FastEthernet0/0 crypto map VPN
copy run start
Purley#show crypto ca certificate Certificate Status: Available Certificate Serial Number: 61E0446A000000000002 Certificate Usage: General Purpose Issuer: cn=WIN-SQV1ABKN6Q4-CA dc=ACME dc=COM Subject: Name: purley.acme.com cn=purley.acme.com ou=sales o=acme ltd l=purley st=surrey c=GB CRL Distribution Point: file://WIN-SQV1ABKN6Q4/CertEnroll/WIN-SQV1ABKN6Q4-CA.crl Validity Date: start date: 14:46:13 UTC May 14 2012 end date: 14:56:13 UTC May 14 2013 Associated Trustpoints: Purley
CA Certificate Status: Available Certificate Serial Number: 222F01C2CED6A5B94F83A17D00339E6B Certificate Usage: Signature Issuer: cn=WIN-SQV1ABKN6Q4-CA dc=ACME dc=COM Subject: cn=WIN-SQV1ABKN6Q4-CA dc=ACME dc=COM Validity Date: start date: 12:48:03 UTC May 14 2012 end date: 12:58:02 UTC May 14 2017 Associated Trustpoints: Purley
i entered the following commands on the router to delete the certificate but as you can see its telling me the certificate dosn't exist (this method of deleting the cert has come from Richard Deals complete cisco vpn configuration guide)
Purley(config)#crypto ca certificate chain Purley Purley(config-cert-chain)#no certificate 61E0446A000000000002 % Certificate not found.
has anyone any ideas as i am stumpted
ps the router is a 3640 running c3640-jk9o3s-mz.124-7.bin
To help you better understand what makes Secure Endpoint such a valuable tool in their arsenal, we’ve summarised top tips which customers can use which can avoid them getting stalled in their implementation stages of the solution. Data tells us, at the po...
We’re excited to announce new capabilities with Secure Endpoint that allow you to simplify your security and maximize your security operations: Unify your security stack and reduce agent fatigue with Cisco Secure Client; harness integrated risk-based vuln...
Listen: https://smarturl.it/CCRS8E47 Follow us: twitter.com/CiscoChampion
Ransomware, fileless malware, and zero-day attacks continue to target organizations around the world. In response, organizations have resorted to deploying a variety of di...
This is a general information page for Cisco Threat Centric (TC-NAC) with ISE
Threat Centric Network Access Control (TC-NAC) feature enables you to create authorization policies based on the threat and vulnerability attributes received from the th...
The 2021 IT Blog Awards, hosted by Cisco, is now open for submissions. Submit your blog, vlog or podcast today. For more information, including category details, the process, past winners and FAQs, check out: https://www.cisco.com/c/en/us/t...