Moral of the story - if you are getting checksum errors on the rommon prompt of a Cisco IOS router, and you know that you have downloaded the correct image from the correct website, then either your router's flash memory or the USB drive you are using to transfer it is corrupt. I know the latter seems like a distant possibility, but yes, it has happened to me and I lost a good 3 weeks of productive time trying to troubleshoot this.
Peace!!
Friday, July 30, 2010
Saturday, July 10, 2010
How to see a Cisco IOS CA's root certificate
If you have created an IOS CA server and want to see its root certificate for distribution to other machines, then you must look at its storage location. Suppose you used the following to create your CA:
Now if you look at the storage location (flash in this case, as specified above), you will see a three files named after your CA server (with extensions ending in ser, crl and p12).
# enable(config)# cry pki server thehacklist(cs-server)# database url flash:(cs-server)# issuer-name C=IN, ST=WB, O=thehacklist(cs-server)# cdp none(cs-server)# grant auto(cs-server)# no shut%Some server settings cannot be changed after CA certificate generation.% Please enter a passphrase to protect the private key% or type Return to exitPassword:
Re-enter password:% Generating 1024 bit RSA keys, keys will be non-exportable...[OK]% Exporting Certificate Server signing certificate and keys...
% Certificate Server enabled.(cs-server)# end
Now if you look at the storage location (flash in this case, as specified above), you will see a three files named after your CA server (with extensions ending in ser, crl and p12).
From here, to see the root certificate of the CA, you can use:
# dir flash:Directory of flash:/
11 -rw- 32 Jul 10 2010 17:54:20 +00:00 thehacklist.ser1 -rw- 1826 Jan 15 2008 17:52:38 +00:00 sdmconfig-38xx.cfg2 -rw- 6036480 Jan 15 2008 17:53:10 +00:00 sdm.tar3 -rw- 861696 Jan 15 2008 17:53:26 +00:00 es.tar4 -rw- 1164288 Jan 15 2008 17:53:46 +00:00 common.tar5 -rw- 1038 Jan 15 2008 17:54:02 +00:00 home.shtml6 -rw- 113152 Jan 15 2008 17:54:16 +00:00 home.tar7 -rw- 1697952 Jan 15 2008 17:54:42 +00:00 securedesktop-ios-3.1.1.45-k9.pkg8 -rw- 416354 Jan 15 2008 17:55:06 +00:00 sslclient-win-1.1.3.173.pkg9 -rw- 59526004 Jun 29 2010 19:23:10 +00:00 c3845-advipservicesk9-mz.124-22.T210 -rw- 60288320 Dec 15 2008 23:27:58 +00:00 c3845-adventerprisek9-mz.124-20.T12 -rw- 247 Jul 10 2010 17:54:20 +00:00 thehacklist.crl13 -rw- 1627 Jul 10 2010 17:54:22 +00:00 thehacklist_00001.pem
# more flash:/thehacklist_00001.pem-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
Subscribe to:
Posts (Atom)