Users Guide

Table Of Contents
Command Modes
CONFIGURATION Mode
Command
History
This guide is platform-specific. For command information about other platforms, see the relevant Dell
EMC Networking OS Command Line Reference Guide.
The following is a list of the Dell EMC Networking OS version history for this command:
Version Description
9.11.0.0 Introduced this command.
Related
Commands
crypto x509 ocsp
debug crypto
This command allows you to test a certificate chain file for validity and checking revocation outside of its use in TLS
communication.
Syntax
debug crypto {flash://path}
Parameters
path Enter the path to a local file where a certificate chain is stored in PEM format.
Defaults None.
Command Modes EXEC Privilege
Command
History
This guide is platform-specific. For command information about other platforms, see the relevant Dell
EMC Networking OS Command Line Reference Guide.
The following is a list of the Dell EMC Networking OS version history for this command:
Version Description
9.11.0.0 Introduced this command.
Usage
Information
The following RBAC roles are allowed to issue this command:
sysadmin
secadmin
You can use this command to verify an X509 certificate outside of use with Syslog over TLS.
Related
Commands
crypto cert install
crypto cert generate
crypto ca-cert install
logging secure
Creates a log file for various events related to X.509v3 certificates.
Syntax
logging {hostname} {secure | tcp | udp} [vrf vrf-name] [sha1 fingerprint]
[port port-number]
Parameters
hostname Enter the name of the host or device for which you wish to record logs
corresponding to the certificates.
NOTE: The hostname can be an IPV4 address, an IPV6 address, or a DNS
hostnamewith or without DNS suffix.
secure Enter the keyword secure to enable the Syslog feature to communicate with
a compatible Syslog server using the secure TLS protocol over the default port
(6514). The range is from 1024 to 65535.
1782 X.509v3