06-07-2024 03:08 AM
Hello everyone,
I am trying to configure a nexus (nx os 9.3) to send its logs to syslog server over tls.
logging server 10.10.10.1 5 port 6514 secure use-vrf management
When I try to configure the trustpoint I get the error "certificate is missing basic constraints extension , could not perform CA authentication".
crypto ca authenticate my-ca
I am pasting the root, intermediate and server certificates (pem) after this command. I have checked use openssl that the root and intermediate certs do have the basic constraints extension, and CA=true.
Also if I only paste the root and intermediate certificate then I don't have this error. This leads me to think that in the trustpoint I can only have CA certs, not the server certs. Is this true? and in that case where should I import the server cert? should it work without the server cert? Previous I worked on firewalls and there we had to import the whole chain from the server, intermediate and root.
Thanks in advance.
Solved! Go to Solution.
06-10-2024 10:36 PM
yes if the router acting as CA and syslog trust that certs
06-07-2024 09:06 AM
Syslog server and nexus device should trust same CA for them to communicate.
06-10-2024 03:40 AM
Thanks for the link. So if I understand correctly, we don't need to add the certificate of the syslog server. It should work if the CA certificate installed on the nexus device refers to the CA originally used to create the syslog server certificate.
06-10-2024 10:36 PM
yes if the router acting as CA and syslog trust that certs
06-07-2024 09:20 AM
Show crypto ca trustpoint
Share this
MHM
06-09-2024 11:52 PM
#show crypto ca trustpoint
trustpoint: root-ca key-pair:
revokation methods: none
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide