ca trust-point
To identify the trustpoints that is used to validate a certificate during Internet Key Exchange (IKE) authentication, use the ca trust-point command in ISAKMP profile configuration mode. To remove the trustpoint, use the no form of this command.
ca trust-point trustpoint-name
no ca trust-point trustpoint-name
Syntax Description
trustpoint-name |
The trustpoint name as defined in the global configuration. |
Command Default
If there is no trustpoint defined in the Internet Security Association and Key Management Protocol (ISAKMP) profile configuration, the default is to validate the certificate using all the trustpoints that are defined in the global configuration.
Command Modes
ISAKMP profile configuration (conf-isa-prof)
Command History
Release |
Modification |
---|---|
12.2(15)T |
This command was introduced. |
Cisco IOS XE Release 2.6 |
This command was integrated into Cisco IOS XE Release 2.6. |
Usage Guidelines
The ca trust-point command can be used multiple times to define more than one trustpoint.
This command is useful when you want to restrict validation of certificates to a list of trustpoints. For example, the router global configuration has two trustpoints, A and B, which are trusted by VPN1 and VPN2, respectively. Each Virtual Private Network (VPN) wants to restrict validation only to its trustpoint.
Before you can use this command, you must enter the crypto isakmp profile command.
Note |
A router initiating IKE and a router responding to the IKE request should have symmetrical trustpoint configurations. For example, a responding router (in IKE Main Mode) performing RSA signature encryption and authentication might use trustpoints that were defined in the global configuration when sending the CERT-REQ payloads. However, the router might use a restricted list of trustpoints that were defined in the ISAKMP profile for the certificate verification. If the peer (the IKE initiator) is configured to use a certificate whose trustpoint is in the global list of the responding router but not in ISAKMP profile of the responding router, the certificate is rejected. (However, if the initiating router does not know about the trustpoints in the global configuration of the responding router, the certificate can still be authenticated.) |
To validate a certificate chain sent by the initiator, it is recommended that you configure the required trustpoints of the certificate chain in the ISAKMP profile of the responder. For example, the following configuration on the responder will fail when the initiator sends a certificate chain for myroot trustpoint.
crypto pki trustpoint mysub
chain-validation continue myroot
revocation-check crl
rsakeypair mysub
!
crypto pki trustpoint myroot
enrollment terminal
revocation-check crl
crypto isakmp identity dn
crypto isakmp profile mypeer
ca trust-point mysub
match certificate cisco
This is because the responder builds the CERT_REQ based on trustpoints in the reverse order in which they are defined globally. IKE responder sends the CERT_REQ for myroot to the initiator and IKE initiator sends myroot certificate chain to validate this certificate chain. This can be avoided by the following configuration on the responder ISAKMP profile.
crypto pki trustpoint mysub
chain-validation continue myroot
revocation-check crl
rsakeypair mysub
!
crypto pki trustpoint myroot
enrollment terminal
revocation-check crl
!
crypto isakmp identity dn
crypto isakmp profile mypeer
ca trust-point myroot
ca trust-point mysub
match certificate cisco
Examples
The following example specifies two trustpoints, A and B. The ISAKMP profile configuration restricts each VPN to one trustpoint.
crypto ca trustpoint A
enrollment url http://kahului:80
crypto ca trustpoint B
enrollment url http://arjun:80
!
crypto isakmp profile vpn1
trustpoint A
!
crypto isakmp profile vpn2
ca trust-point B