Connectivity Guide

When you install a certicate-key pair, both take the name of the certicate. Enter the certicate-key pair name
without an extension as the certificate-name value. The no form of the command removes the certicate-
key pair from the prole.
Example
OS10# crypto security-profile secure-radius-profile
OS10(config-sec-profile)# certificate Dell_host1
Supported releases 10.4.3.0 or later
cluster security-prole
Creates a security prole for a cluster application.
Syntax
cluster security-profile profile-name
Parameters prole-name — Enter the name of the security prole, up to 32 characters.
Default Not congured
Command mode CONFIGURATION
Usage information When you enable VLT or a fabric automation application, switches that participate in the cluster use secure
channels to communicate with each other. OS10 installs a default X.509v3 certicate-key pair that is used to
establish secure channels between peer devices in a cluster. If untrusted devices access the management or data
ports on the switch, you should replace the default certicate-key pair with a custom X.509v3 certicate-key pair
using the cluster security-profile command. A security prole associates a certicate and private key
pair using the certificate command. The no form of the command deletes the cluster security prole.
Example
OS10(config)# cluster security-profile secure-cluster
OS10(config)#
Supported releases 10.4.3.0 or later
crypto ca-cert delete
Deletes a CA certicate.
Syntax
crypto ca-cert delete {ca-cert-filepath | all}
Parameters
ca-cert-filepath — Enter the local path where the downloaded CA certicate is stored; for example,
home://CAcert.pem or usb://CA-cert.pem.
all — Delete all CA certicates.
Default Not congured
Command mode EXEC
Usage information To display the currently installed CA certicates, use the show crypto ca-certs command.
Example
OS10# crypto ca-cert delete Amazon_Root_CA.crt
Successfully removed certificate
OS10# crypto ca-cert delete all
Proceed to delete all installed CA certificates? [confirm yes/no(default)]:yes
Supported releases 10.4.3.0 or later
Security 839