Monitoring Digital Certificates and Public Keys
Use the following show commands to display information about IKE certificates, IKE configurations, CRLs, public keys, and peer public keys.
show ipsec ca identity
- Use to display information about IKE CA identities used by the router for online digital certificate configuration. You can display information for a specific CA or for all CAs configured on the router.
- Field descriptions
- CACertificate authority that the router uses to generate certificate requests
- enrollment urlURL of the SCEP server where the router sends certificate requests
- issuer idName of the CA issuer providing the digital certificates
- retry periodNumber of minutes that the router waits after receiving no response from the CA before resending a certificate request
- retry limitNumber of minutes during which the router continues to send a certificate request to the CA
- crl settingSetting that controls how the router checks the certificate revocation lists
- proxy urlHTTP proxy server used to retrieve the root CA certificate, if any
host1#show ipsec ca identity mysecureca1CA: mysecureca1 parameters:enrollment url:http://192.168.10.124/scepurlissuer id :BetaSecurityCorpretry period :1retry limit :60crl setting :optionalproxy url :show ipsec certificates
NOTE: The show ike certificates command has been replaced by the show ipsec certificates command and may be removed completely in a future release.
- Use to display the IKE certificates and CRLs on the router. Specify the type of certificate you want to display:
- allAll certificates configured on the router
- crlCertificate revocation lists
- peerPeer certificates
- public-certsPublic certificates
- root-casRoot CA certificates
- Use the hex-format keyword to display certificate data, such as serial numbers, in hexadecimal format. Doing so allows easier comparison with CAs, such as Microsoft, that display certificates in hexadecimal format.
- Field descriptions
- Ca identityCertificate authority that the router uses to generate certificate requests
- SubjectNameDistinguished name for the certificate
- IssuerNameOrganization that signed and issued the certificate
- SerialNumberUnique serial number assigned to the certificate by the CA
- SignatureAlgorithmAlgorithm used for the digital signature
- ValidityBeginning and ending period during which the certificate is valid
- PublicKeyInfoInformation about the public key
- ExtensionsFields that provide additional information for the certificate
- FingerprintsUnique hash of the certificate, which can be used to verify that the certificate is valid
host1#show ipsec certificates public-certs---------- Public Certificates: ----------Ca Identity:[trustedca1]Certificate =SubjectName = <C=us, O=junipernetworks, CN=jim>IssuerName = <C=CA, ST=ON, L=Kanata, O=BetaSecurityCorp, OU=VT Group, CN=VT Root CA>SerialNumber= 84483276204047383658902SignatureAlgorithm = rsa-pkcs1-sha1Validity =NotBefore = 2003 Oct 21st, 16:14:42 GMTNotAfter = 2004 Oct 21st, 16:24:42 GMTPublicKeyInfo =PublicKey =Algorithm name (SSH) : if-modn{sign{rsa-pkcs1-md5}}Modulus n (1024 bits) :134091279653070615030540500538006424883565376680781606052426226613116251987660780668684682207035965864954637412854087621341685851428803058412405896520823533525098960335493944208019747261524241389345208872551265097585427735881258246124244228778707000289561722844010730391924576190024855366053321117704284702619Exponent e ( 17 bits) :65537Extensions =Available = authority key identifier, subject key identifier, key usage,subject alternative name, authority information access, CRL distributionpointsSubjectAlternativeNames =Following names detected =DNS (domain name server name)Viewing specific name types =DNS = host1.kanata.junipernetworks.comKeyUsage = DigitalSignatureCRLDistributionPoints =% Entry 1FullName =Following names detected =URI (uniform resource indicator)Viewing specific name types =URI = http://vtsca1/CertEnroll/VTS%20Root%20CA.crl% Entry 2FullName =Following names detected =URI (uniform resource indicator)Viewing specific name types =No names of type IP, DNS, URI, EMAIL, RID, UPN or DN detected.AuthorityKeyID =KeyID =15:0a:17:4d:36:b6:49:96:fa:d5:be:df:51:3e:e4:90:51:a2:c0:95AuthorityCertificateIssuer =Following names detected =DN (directory name)Viewing specific name types =No names of type IP, DNS, URI, EMAIL, RID, UPN or DN detected.AuthorityCertificateSerialNumber = 79592882508437425959858112994892506178SubjectKeyID =KeyId =78:e0:3e:f7:24:65:2d:4b:01:d4:91:f9:66:c7:67:26:06:74:6c:5cAuthorityInfoAccess =AccessMethod = 1.3.6.1.5.5.7.48.2AccessLocation =Following names detected =URI (uniform resource indicator)Viewing specific name types =No names of type IP, DNS, URI, EMAIL, RID, UPN or DN detected.AccessMethod = 1.3.6.1.5.5.7.48.2AccessLocation =Following names detected =URI (uniform resource indicator)Viewing specific name types =No names of type IP, DNS, URI, EMAIL, RID, UPN or DN detected.Fingerprints =MD5 = c4:c9:22:b6:19:07:4e:4f:ee:81:7a:9f:cb:f9:1f:7eSHA-1 = 58:ba:fb:0d:68:61:42:2a:52:7e:19:82:77:a4:55:4c:25:8c:c5:60Example 2 host1#show ipsec certificates root-cas---------- Root CAs: ----------Ca Identity:[trustedca1]Certificate =SubjectName = <C=CA, ST=ON, L=Kanata, O=Juniper Networks, OU=VTS Group, CN=VTS Root CA>IssuerName = <C=CA, ST=ON, L=Kanata, O=BetaSecurityCorp, OU=VT Group, CN=VT Root CA>SerialNumber= 79592882508437425959858112994892506178SignatureAlgorithm = rsa-pkcs1-sha1Certificate seems to be self-signed.* Signature verification success.Validity =NotBefore = 2003 Mar 26th, 15:50:53 GMTNotAfter = 2006 Mar 26th, 15:59:59 GMTPublicKeyInfo =PublicKey =Algorithm name (SSH) : if-modn{sign{rsa-pkcs1-md5}}Modulus n (1024 bits) :144248074987660012010604335256719344018162132468668237226501170070305001241415247280062973777384554931083380465397528824648638175900301022467253370575541853958272072875412915858260834056069053966369912244336288229094433819000056156526315600443048638564217398483268658776617873141444478276502323232108941157077Exponent e ( 17 bits) :65537Extensions =Available = subject key identifier, key usage, basic constraints(critical),CRL distribution points, unknownKeyUsage = DigitalSignature NonRepudiation KeyCertSign CRLSignBasicConstraints =cA = TRUE[critical]CRLDistributionPoints =% Entry 1FullName =Following names detected =URI (uniform resource indicator)Viewing specific name types =URI = http://vtsca1/CertEnroll/VTS%20Root%20CA.crl% Entry 2FullName =Following names detected =URI (uniform resource indicator)Viewing specific name types =No names of type IP, DNS, URI, EMAIL, RID, UPN or DN detected.SubjectKeyID =KeyId =15:0a:17:4d:36:b6:49:96:fa:d5:be:df:51:3e:e4:90:51:a2:c0:95Unknown 1.3.6.1.4.1.311.21.1 =02:01:00 ...Fingerprints =MD5 = 8c:56:fb:a6:bd:ab:13:67:e6:13:09:c1:d0:de:1f:24SHA-1 = 22:3d:84:6d:d4:5f:18:87:ae:2c:15:7d:2a:94:20:ff:c6:12:fb:6fshow ipsec identity
NOTE: The show ike identity command has been replaced by the show ipsec identity command and may be removed completely in a future release.
- Domain NameDomain name the router uses in IKE authentication messages and to generate certificate requests
- Common NameCommon name used to generate certificates
- OrganizationName of the organization used in the Subject Name field of certificates
- CountryCountry used to generate certificates
host1#show ipsec identityIke identity:Domain Name :myerx.kanata.junipernetworks.comCommon Name :jimOrganization:junipernetworksCountry :cashow ipsec ike-configuration
NOTE: The show ike configuration command has been replaced by the show ipsec ike-configuration command and may be removed completely in a future release.
- Ike identityInformation from your IKE identify configuration that the router uses to generate certificate requests
- CRL CheckSetting of the CRL check: optional, required, ignored
host1#show ipsec ike-configurationIke configuration:Ike identity:Domain Name :treverxsys2.juniper.netCommon Name :Sys2 ERXOrganization:Juniper NetworksCountry :CACRL Check:optionalshow ipsec key mypubkey rsa
- Use to display the 1024-bit or 2048-bit RSA public key configured on the router.
- The public key is generated as part of a public/private key pair used to perform RSA authentication during ISAKMP/IKE SA negotiations.
- For information about the format of an RSA public key, see Public Key Format.
- Example
host1#show ipsec key mypubkey rsa30819f30 0d06092a 864886f7 0d010101 05000381 8d003081 89028181 009cfbdea16cf72c 49fbd3c1 10d5d9d4 8ba15ec0 9adcb19e 18d488f8 e0370c51 2d10e751ddd81be4 dfc78aad 9deb797f b2c51172 18967cfb e18f6efa 69285fef 1033752778ca6bbc 907abb9e 44b12713 ab70cb0e a86d9c6c 80c99bd1 e2bf6b70 91222295616a88bb cc479e15 be04f3a5 a6160645 844598c3 314b66af 3a8b7602 ed0203010001show ipsec key pubkey-chain rsa
- Use to display a 1024-bit or 2048-bit ISAKMP/IKE public key that a remote peer uses for RSA authentication.
- To display a brief summary of the remote peers for which public keys are configured on the router, use the summary keyword.
- To display the public key for a remote peer with a specific IP address, use the address keyword followed by the IP address, in 32-bit dotted decimal format.
- To display the public key for a remote peer with a specific identity, use the name keyword followed by either:
- The fully qualified domain name (FQDN)
- The FQDN preceded by an optional user@ specification; this is also referred to as user FQDN format
- The FQDN and user FQDN identifiers are case-sensitive and must exactly match the identifier specified in the ipsec key pubkey-chain rsa command. For example, a public key for user FQDN mjones@sales.company_abc.com does not match a public key for FQDN sales.company_abc.com.
- For information about the format of an RSA public key, see Public Key Format.
- Field descriptions
- Remote PeerIP address, FQDN, or user FQDN identifier of the remote peer for which the peer public key can be used
- Key TypeType of remote peer identifier: ip address (if IP address is specified) or identity (if FQDN or user FQDN is specified)
host1#show ipsec key pubkey-chain rsa summaryRemote Peer Key Type----------------------------- ----------192.168.32.3 ip addressgrp003.cust535.isp.net identitytsmith@grp003.cust535.isp.net identityExample 2Displays the peer public key for a remote peer with the specified IP address host1#show ipsec key pubkey-chain rsa address 192.168.32.330819f30 0d06092a 864886f7 0d010101 05000381 8d003081 89028181 0082065f841aa03a fadfda9f bf8be05c d2fe3596 abc3e265 0b86b99a df9b4907 29c7a7378bf08491 5c96e72d 28471a12 f0735ff4 04d76ad1 3a80f10c 23dcadda b68ce8ec5fdfbe58 a52008db 9a11f867 d38d0483 e4abd53c 89a4dc3c 985ea450 f17748c43f04def0 a3cf5d89 b62dfeae 5990641b 370bb113 73105ba7 585a41fc 3b0203010001Example 3Displays the peer public key for a remote peer with the specified FQDN identifier host1#show ipsec key pubkey-chain rsa name grp003.cust535.isp.net30820122 300d0609 2a864886 f70d0101 01050003 82010f00 3082010a 0282010100c03cc6 0bad55ea b4f8a01f 5cf69de5 f03185e2 1338b5cb fa8418c3 6cbe1a77bfefba5b 7a8f0ac2 6e2b223b 11e3c316 a30f7fb0 7bd2ab8a a614bb3d 2fce97bfd6376467 0d5d1a16 d630c173 3ed93434 e690f355 00128ffb c36e72fa 46eae49a5704eabe 0e34776c 7d243b8b fcb03c75 965c12f4 d68c6e63 33e0207c a985ffff2422fb53 23d49dbb f7fd3140 a7f245ee bf629690 9356a29c b149451a 691a25319787ce37 2601bdf9 1434b174 4fd21cf2 48e10f58 9ac89df1 56e360b1 66fb0b3f27ad6396 7a491d74 3b8379ea be502979 8f0270b2 6063a474 fadc5f18 f0ca6f7addea66c7 cf637598 9cdb5087 0480af29 b9c174ab 1b1d033f 67641a8c 5918ddce1f020301 0001Example 4Displays the peer public key for a remote peer with the specified user FQDN identifier host1#show ipsec key pubkey-chain rsa name tsmith@grp003.cust535.isp.net30819f30 0d06092a 864886f7 0d010101 05000381 8d003081 89028181 00bcc1068694a505 0b92433e 4c27441e 3ad8955d 5628e2ea 5ee34b0c 6f82c4fd 8d5b7b51f1a3c94f c4373f9b 70395011 79b4c2fb 639a075b 3d66185f 9cc6cdd1 6df51f74cb69c8bb dbb44433 a1faac45 10f52be8 d7f2c8cd ad5172a6 e7f14b1c bba4037b29b475c6 ad7305ed 7c460779 351560c6 344ccd1a 35935ea3 da5de228 bd0203010001