I do wonder if this is the right behaviour of the router. If I reload my Cisco 3620 IOS VPN Server, both CA and router's itself certificates are gone. Need to do the procedure (crypto ca authenticate ..., crypto ca enroll ...) to get the certificates. IOS version:
IOS (tm) 3600 Software (C3620-IK9O3S3-M), Version 12.2(13)T5, RELEASE SOFTWARE (fc1)
System image file is "flash:c3620-ik9o3s3-mz.122-13.T5.bin"
Be aware that the certificates and the revocation list when used can be a memory problem for the router. Normally certificates and CRLs are stored locally in the router's NVRAM, and each certificate and CRL uses a moderate amount of memory. But it can happen that the router lacks memory space and will not store the information in NVRAM. Hence, when rebooting the router, the some certificate and some revocation lists could be lost. Please take a look at :
Helps meet PCI* compliance.
Threat protection built into ISR and ISRv branch routers and CSR
Complements ISR Integrated Security
Lightweight IPS solution with low TCO (Total Cost of Ownership) and automated signature updates
Supports VRF (16.6)
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...