Manage Certificates in Cisco vManage
Perform certificate operations in Cisco vManage on the Configuration > Certificates page.
-
Top bar—On the left are the menu icon, for expanding and collapsing the Cisco vManage menu, and the vManage product name. On the right are a number of icons and the user profile drop-down.
-
Title bar—Includes the title of the screen, Certificates.
-
WAN Edge List tab—Install the router authorized serial number file on the controllers in the overlay network and manage the serial numbers in the file. When you first open the Certificates screen, the WAN Edge List tab is selected.
-
Send to Controllers—Send the WAN edge router chassis and serial numbers to the controllers in the network.
-
Table of WAN edge routers in the overlay network—To re-arrange the columns, drag the column title to the desired position.
-
-
Controllers tab—Install certificates and download the device serial numbers to the vBond orchestrator.
-
Send to vBond—Send the controller serial numbers to the Cisco vBond Orchestrator.
-
Install Certificate—Install the signed certificates on the controller devices. This button is available only if you select Manual in
. -
Export Root Certificate—Display a copy of the root certificate for the controller devices that you can download to a file.
-
Table of controller devices in the overlay network—To re-arrange the columns, drag the column title to the desired position.
-
Certificate status bar—Located at the bottom of the screen, this bar is available only if you select Server Automated in
. It displays the states of the certificate installation process:-
Device Added
-
Generate CSR
-
Waiting for Certificate
-
Send to Controllers
-
-
-
Search box—Includes the Search Options drop-down, for a Contains or Match string.
-
Refresh icon—Click to refresh data in the device table with the most current data.
-
Export icon—Click to download all data to a file, in CSV format.
-
Show Table Fields icon—Click the icon to display or hide columns from the device table. By default, all columns are displayed.
Check the WAN Edge Router Certificate Status
In the WAN Edge List tab, check the Validate column. The status can be one of the following:
-
Valid (shown in green)—The router's certificate is valid.
-
Staging (shown in yellow)—The router is in the staging state.
-
Invalid (shown in red)—The router's certificate is not valid.
Validate a WAN Edge Router
When you add Cisco vEdge devices and WAN routers to the network using the screen, you can automatically validate the routers and send their chassis and serial numbers to the controller devices by clicking the checkbox Validate the uploaded WAN Edge List and send to controllers. If you do not select this option, you must individually validate each router and send their chassis and serial numbers to the controller devices. To do so:
-
In the WAN Edge List tab, select the router to validate.
-
In the Validate column, click Valid.
-
Click OK to confirm the move to the valid state.
-
Repeat the steps above for each router you wish to validate.
-
Click the Send to Controllers button in the upper left corner of the screen to send the chassis and serial numbers of the validated routers to the controller devices in the network. Cisco vManage NMS displays the Push WAN Edge List screen showing the status of the push operation.
Stage a WAN Edge Router
When you initially bring up and configure a WAN Edge router, you can place it in staging state using the Cisco vManage instance. When the router is in this state, you can configure the router, and you can test that the router is able to establish operational connections with the vSmart controller and the vManage instance.
After you physically place the router at its production site, you change the router's state from staging to valid. It is only at this point that the router joins the actual production network. To stage a router:
-
In the WAN Edge List tab, select the router to stage.
-
In the Validate column, click Staging.
-
Click OK to confirm the move to the staging state.
-
Click Send to Controllers in the upper left corner of the screen to sync the WAN edge authorized serial number file with the controllers. vManage NMS displays the Push WAN Edge List screen showing the status of the push operation.
-
To unstage, validate the WAN Edge Router.
Invalidate a WAN Edge Router
-
In the WAN Edge List tab, select the router to invalidate.
-
In the Validate column, click Invalid.
-
Click OK to confirm the move to the invalid state.
-
Repeat the steps above for each router you wish to invalidate.
-
Click the Send to Controllers button in the upper left corner of the screen to send the chassis and serial numbers of the validated routers to the controller devices in the network. Cisco vManage instance displays the Push WAN Edge List screen showing the status of the push operation.
Send the Controller Serial Numbers to Cisco vBond Orchestrator
To determine which controllers in the overlay network are valid, the Cisco vBond Orchestrator keeps a list of the controller serial numbers. The Cisco vManage instance learns these serial numbers during the certificate-generation process.
To send the controller serial numbers to the Cisco vBond Orchestrator:
-
In the Controllers tab, check the certificate status bar at the bottom of the screen. If the Send to Controllers check mark is green, all serial numbers have already been sent to the Cisco vBond Orchestrator. If it is grey, you can send one or more serial numbers to the Cisco vBond Orchestrator.
-
Click the Send to vBond button in the Controllers tab. A controller's serial number is sent only once to the Cisco vBond Orchestrator. If all serial numbers have been sent, when you click Send to vBond, an error message is displayed. To resend a controller's serial number, you must first select the device and then select Invalid in the Validity column.
After the serial numbers have been sent, click the Tasks icon in the Cisco vManage toolbar to display a log of the file download and other recent activities.
Install Signed Certificate
If in Manual option for the certificate-generation process, use the Install Certificate button to manually install certificates on the controller devices.
, you selected theAfter Symantec or your enterprise root CA has signed the certificates, they return the files containing the individual signed certificates. Place them on a server in your local network. Then install them on each controller:
-
In the Controllers tab, click Install Certificate.
-
In the Install Certificate window, select a file, or copy and paste the certificate text.
-
Click Install to install the certificate on the device. The certificate contains information that identifies the controller, so you do not need to select the device on which to install the certificate.
-
Repeat Steps the steps above to install additional certificates.
Export Root Certificate
-
In the Controllers tab, click the Export Root Certificate button.
-
In the Export Root Certificate window, click Download to export the root certificate to a file.
-
Click Close.
View a Certificate Signing Request
-
In the WAN Edge List or Controllers tab, select a device.
-
Click the More Actions icon to the right of the row, and click View CSR to view the certificate signing request (CSR).
View a Device Certificate Signing Request
-
In the WAN Edge List or Controllers tab, select a Cisco IOS XE SD-WAN device.
-
Click the More Actions icon to the right of the row, and click View Device CSR to view the certificate signing request (CSR).
For a Cisco IOS XE SD-WAN device where trustpoint has been configured, clicking the More Actions icon allows you to view three options:
-
View Device CSR
-
Generate Feature CSR
-
View Feature CSR
-
![]() Note |
Cisco vManage will generate alarms only if device certificate is installed through Cisco vManage. If you install certificate manually, Cisco vManage will not generate alarms for certificate expiration. |
View the Certificate
-
In the Controllers tab, select a device.
-
Click the More Actions icon to the right of the row and click View Certificate.
Generate a Certificate Signing Request
The following procedures describe the process of generating CSRs.
Generate a Controller Certificate Signing Request
-
From the Cisco vManage menu, choose .
-
Click Controllers.
-
For the desired controller, click … and choose Generate CSR.
The Generate CSR window is displayed.
-
In the Generate CSR window, click Download to download the file to your local PC (that is, to the PC you are using to connect to the Cisco vManage NMS).
-
Repeat the preceding steps to generate a CSR for another controller.
Generate a Feature Certificate Signing Request
-
From the Cisco vManage menu, choose .
-
Click WAN Edge List.
-
For the desired device, click … and choose Generate Feature CSR.
The Generate Feature CSR window is displayed.
-
In the Generate Feature CSR window, click OK to continue with the generation of feature CSR. This step authenticates the device trustpoint that has been set and extracts the CSR from the device.
-
Repeat the steps above for each device for which you are generating a CSR.
Generate a WAN Edge Device Certificate Signing Request
-
From the Cisco vManage menu, choose .
-
Click WAN Edge List.
-
For the desired device, click … and choose Renew Device CSR.
The Renew Device CSR window is displayed.
-
In the Renew Device CSR window, click OK to continue with the generation of a new CSR.
![]() Note |
Cisco vManage Release 20.9.1 and later releases: Clicking Renew Device CSR resets the RSA private and public keys, and generates a CSR that uses a new key pair. Cisco vManage also resets RSA private and public keys before generating a new CSR in Cisco vManage Release 20.6.4 and later Cisco vManage 20.6.x releases. Cisco vManage releases other than the above-mentioned releases: Clicking Renew Device CSR generates a CSR using the existing key pair. |
Reset the RSA Key Pair
-
In the Controllers tab, select a device.
-
Click the More Actions icon to the right of the row and click Reset RSA.
-
Click OK to confirm resetting of the device's RSA key and to generate a new CSR with new public or private keys.
Invalidate a Device
-
In the Controllers tab, select a device.
-
Click the More Actions icon to the right of the row and click Invalidate.
-
Click OK to confirm invalidation of the device.
View Log of Certificate Activities
To view the status of certificate-related activities:
-
Click the Tasks icon located in the vManage toolbar. Cisco vManage NMS displays a list of all running tasks along with the total number of successes and failures.
-
Click a row to see details of a task. Cisco vManage NMS opens a status window displaying the status of the task and details of the device on which the task was performed.
View a Signed Certificate
Signed certificates are used to authenticate Cisco SD-WAN devices in the overlay network. To view the contents of a signed certificate using Cisco vManage:
-
From the Cisco vManage menu, choose .
-
Click Controllers.
-
For the desired device, click ... and choose View Certificate to view the installed certificate.
Certificate Revocation
Feature Name |
Release Information |
Feature Description |
---|---|---|
Certificate Revocation |
Cisco IOS XE Release 17.7.1a Cisco SD-WAN Release 20.7.1 Cisco vManage Release 20.7.1 |
This feature revokes enterprise certificates from devices based on a certificate revocation list that Cisco vManage obtains from a root certificate authority. |
Information About Certificate Revocation
If you are using enterprise certificates with Cisco SD-WAN, you can enable Cisco vManage to revoke designated certificates from devices, as needed. For example, you might need to revoke certificates if there has been a security issue at your site.
![]() Note |
The certificate revocation feature is disabled by default. |
Cisco vManage revokes the certificates that are included in a certificate revocation list (CRL) that Cisco vManage obtains from a root certificate authority (CA).
When you enable the Certificate Revocation feature and provide the URL of the CRL to Cisco vManage, Cisco vManage polls the root CA at a configured interval, retrieves the CRL, and pushes the CRL to Cisco IOS XE SD-WAN devices, Cisco vEdge devices, Cisco vBond Orchestrators, and Cisco vSmart Controllers in the overlay network. Certificates that are included in the CRL are revoked from devices.
When certificates are revoked, they are marked as not valid. Device control connections remain up until the next control connection flap occurs, at which time device control connections are brought down. To bring a device control connection back up, reinstall a certificate on the device and onboard the device.
When Cisco vManage revokes certificates from devices, the devices are not removed from the overlay network, but they are prevented from communicating with other devices in the overlay network. A peer device rejects a connection attempt from a device whose certificate is in the CRL.
Restrictions for Certificate Revocation
-
By default, the Certificate Revocation feature is disabled. When you enable the Certificate Revocation feature for the first time, control connections to all the devices in the network flap. We recommend that you enable the feature for the first time during a maintenance window to avoid service disruption.
When you disable the Certificate Revocation feature, control connections to all the devices in the network flap. We recommend that you disable the feature during a maintenance window to avoid service disruption
-
You can use the Certificate Revocation feature only if you are using an enterprise CA to sign certificates for hardware WAN edge certificate authorization, controller certificate authorization, or WAN edge cloud certificate authorization.
-
Cisco vManage can connect to a server to retrieve a CRL only through the VPN 0 interface.
![]() Note |
Starting from Cisco vManage Release 20.11.1, connections through the VPN 512 are supported. |
Configure Certificate Revocation
Before You Begin
Make a note of the URL of the root CA CRL.
Procedure
-
From the Cisco vManage menu, choose .
-
In the Administration Settings window, click Edit next to Certificate Revocation List.
The certificate revocation options appear.
-
Click Enabled.
-
In the CRL Server URL field, enter the URL of the CRL that you created on your secure server.
-
In the Retrieval Interval field, enter the interval, in hours, at which Cisco vManage retrieves the CRL from your secure server and revokes the certificates that the CRL designates.
Enter a value from 1 to 24. The default retrieval interval is 1 hour.
-
Click Save.
Cisco vManage immediately retrieves the CRL and revokes the certificates that the CRL designates. From then on, Cisco vManage retrieves the CRL according to the retrieval interval period that you specified.