I have tried using ftp:, and http: for ‘database url’ but I always get the server status of
Certificate Server root-ca:
Status: disabled, Storage not accessible
and messages similar to “%PKI-3-CS_CRIT_STORAGE: Critical certificate storage, ftp://<username>:<password>@<ftp-server>/0x1.crt, is inaccessible, server disabled.” When I’m using ftp.No message is issued when using http but the server status is the same.And, the cert server appears to write the files 0x1.cnm and 0x1.crt, and the root-ca.ser file to the ftp server but still says storage is inaccessible.
Codes: M - Manually configured, C - Extracted from certificate
rsdpki1#sh crypto pki certificates storage
Certificates will be stored in nvram:
rsdpki1#(I skipped the ‘sh crypto pki counters’)
But the files are written to the ftp server and appear fine.Can anyone tell me the rules for ‘database url’ and/or ‘cdp-url’?The “PKI Service for Large Scale IPSec Aggregation” document (first url) shows both ftp: and http: examples.As I say, I *think* I have the ftp specified correctly because the files are written.But I have no idea what the requirements are for the http server – do I need Web-DAV or something?
I did but that's the problem - the documentation says you can use 'any IOS-supported file system' and the DMVPN docs show several examples using 'ftp://...' and 'http://...' But I could not get anything except Flash: to work. I had to move the root-ca to a different router with a CF card.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in HA
DocumentationCode download linksGoalRequirementLimitationsSupported ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and UCS-E Blades:Step by Step ConfigurationCo...
I am currently unable to specify "crypto keyring" command when configuring VPN connection on my cisco 2901 router.
The following licenses have been activated on my router :