Troubleshooting Steps
The PKI problem can be categorized as follows:
More detailed discussions follow in the next sections.
Certificate Enrollment Process Failure
The certificate enrollment process may fail for two reasons, which are discussed in order:
1. | Incorrect CA URL for CA Server You need to know the correct enrollment URL from CA administration to authenticate the CA and register with the CA server. You also need to find out from CA administration if the registration authority (RA) is used. Also find out how many certificates you are supposed to obtain. For CA mode only, you get the CA root certificate and the router identity certificate. However, for RA mode, you get the CA root certificate, the RA signature certificate, the RA encryption certificate, and the router identity certificate. Example 6-20 shows a sample URL for the Microsoft CA server. Certificate Enrollment Is Fine but IKE Authentication Still FailsIKE authentication occurs on the fifth and sixth packets of IKE negotiation. In the fifth packet, the responder receives the ID payload, cert payload, and signature payload from the initiator. The responder verifies if the initiator's ISAKMP identity in the ID payload matches the identity in the certificate. It performs CRL checking, lifetime checking, and verifies the integrity of the certificate using the public key. It performs an IKE authentication integrity check by recalculating the hash in the signature payload. Checking PKI enrollment and certificate lifetime required multiple commands, the user had to correlate output: IKE with a digital signature may fail for one of the following reasons:
|