To use the offline method to set up digital certificates on the router:
- host1(config)#ipsec key generate rsa 2048
- Please wait.................................................
- ..........................
- IPsec Generate Keys complete
- host1(config)#ipsec ike-policy-rule 1
- host1(config-ike-policy)#authentication rsa-sig
- host1(config-ike-policy)#exit
- host1(config)#
![]() |
Note: For more information about setting up IKE policies, see Defining an IKE Policy in Configuring IPSec. |
- host1(config)#ipsec identity
- host1(config-ipsec-identity)#
- host1(config-ipsec-identity)#country CA
- host1(config-ipsec-identity)#common-name Jim
- host1(config-ipsec-identity)#domain-name myerx.kanata.junipernetworks.com
- host1(config-ipsec-identity)#organization
juniperNetworks
- host1(config-ipsec-identity)#exit
- host1(config)#
- host1(config)#ipsec certificate-request generate
rsa myrequest.crq
- host1(config)#ipsec certificate-database refresh
- host1(config)#ipsec crl ignored
- host1(config)#ipsec key zeroize rsa
authentication
- host1(config-ike-policy)#authentication rsa-sig
common-name
- host1(config-ipsec-identity)#common-name Jim
country
- host1(config-ipsec-identity)#country CA
domain-name
- host1(config-ipsec-identity)#domain-name myerx.kanata.junipernetworks.com
ike crl
- host1(config)#ike crl ignored
![]() |
Note: This command has been replaced by the ipsec crl command and may be removed completely in a future release. |
ipsec certificate-database refresh
![]() |
Note: On reload, the router scans all certificate files and determines which files are router public certificates and which are root CA certificates. |
- host1(config)#ipsec certificate-database refresh
ipsec certificate-request generate
- host1(config)#ipsec certificate-request generate
rsa myrequest.crq
ipsec crl
- host1(config)#ipsec crl ignored
![]() |
Note: This command replaces the ike crl command, which may be removed completely in a future release. |
ipsec identity
- host1(config)#ipsec identity
- host1(config-ipsec-identity)#
ipsec ike-policy-rule
- host1(config)#ipsec ike-policy-rule 3
- host1(config-ike-policy)#
![]() |
Note: This command replaces the ipsec isakmp-policy-rule command, which may be removed completely in a future release. |
ipsec isakmp-policy-rule
- host1(config)#ipsec isakmp-policy-rule 3
- host1(config-ike-policy)#
![]() |
Note: This command has been replaced by the ipsec ike-policy-rule command and may be removed completely in a future release. |
ipsec key generate
- host1(config)#ipsec key generate rsa 2048
- Please wait.................................................
- ..........................
- IPsec Generate Keys complete
ipsec key zeroize
- host1(config)#ipsec key zeroize rsa
organization
- host1(config-ipsec-identity)#organization
juniperNetworks