PKI in Junos OS
Learn about the Junos OS applications that require PKI and the basic elements of PKI.
PKI Applications Overview
Junos OS uses public and private keys in the following areas:
-
SSH and SCP for secure CLI-based administration
-
SSL for secure Web-based administration and for https-based webauth for user authentication
-
IKE for IPsec VPN tunnels.
Note the following points:
-
Currently, Junos OS supports only IKE using PKI certificates for public key validation.
-
The SSH and SCP are used exclusively for system administration. Junos OS uses the OOB fingerprints for public key identity binding and validation.
Basic Elements of PKI in Junos OS
Junos OS supports three specific types of PKI objects.
Elements of PKI | Description |
---|---|
Private and public keypair | A private and public key pair is a fundamental component used for secure
communication.
By using the private and public key pairs, Juniper Networks devices can establish secure connections and protect data transferred over public networks. |
Certificates |
|
Certificate Revocation List (CRL) | A CRL in PKI is a time-stamped list of digital certificates that have been revoked by a CA. This list is signed by the CA and made available to participating peers on a regular periodic basis. In Junos OS, you can configure CRLs to ensure that certificates are not used if they have been revoked. |
Certificates
Note the following points about certificates:
-
Local certificates are generally used when a Junos OS device has VPNs in more than one administrative domain.
-
All PKI objects are stored in a separate partition of persistent memory, apart from the Junos OS image and the system’s general configuration.
-
Each PKI object has a unique name or certificate ID given to it when it is created and maintains this ID until its deletion. You can view the certificate ID by using the
show security pki local-certificate
command. -
A certificate cannot be copied from a device under most circumstances. The private key on a device must be generated on that device only, and it should never be viewed or saved from that device. So PKCS12 files (which contain a certificate with the public key and the associated private key) are not supported on Junos OS devices.
-
CA certificates validate the certificates received by the IKE peer. If the certificate is valid, then it is verified in the CRL to see whether the certificate has been revoked.
Each CA certificate includes a CA profile configuration that stores the following information:
-
CA identity, which is typically the domain name of the CA
-
E-mail address for sending the certificate requests directly to the CA
-
Revocation settings:
-
Revocation checks enable and disable option
-
Disabling of revocation check in case of CRL download failure
-
Location of CRL distribution point (CDP) (for manual URL setting)
-
CRL refresh interval
-
-