Administrator Guide

Version Description
9.11.0.0 Introduced this command.
Related
Commands
crypto x509 ocsp
debug crypto
This command allows you to test a certificate chain file for validity and checking revocation outside of its use in TLS communication.
Syntax
debug crypto {flash://path}
Parameters
path Enter the path to a local file where a certificate chain is stored in PEM format.
Defaults None.
Command Modes EXEC Privilege
Command History
This guide is platform-specific. For command information about other platforms, see the relevant Dell Networking
OS Command Line Reference Guide.
The following is a list of the Dell Networking OS version history for this command:
Version Description
9.11.0.0 Introduced this command.
Usage Information
The following RBAC roles are allowed to issue this command:
sysadmin
secadmin
You can use this command to verify an X509 certificate outside of use with Syslog over TLS.
Related
Commands
crypto cert install
crypto cert generate
crypto ca-cert install
logging secure
Creates a log file for various events related to X.509v3 certificates.
Syntax
logging {hostname} {secure | tcp | udp} [vrf vrf-name] [sha1 fingerprint] [port
port-number]
Parameters
hostname Enter the name of the host or device for which you wish to record logs corresponding to
the certificates.
NOTE: The hostname can be an IPV4 address, an IPV6 address, or a DNS
hostname—with or without DNS suffix.
secure Enter the keyword secure to enable the Syslog feature to communicate with a
compatible Syslog server using the secure TLS protocol over the default port (6514). The
range is from 1024 to 65535.
tcp Enter the keyword tcp to enable TCP.
udp Enter the keyword udp to enable UDP.
vrf
vrf-name
Enter the keyword vrf followed by the name of the VRF.
sha1
fingerprint
Enter the keyword sha1 followed by the finger print. This option is only available when
the secure option is configured. This new option enables the Syslog feature to compare
X.509v3 1733