1-16X509v3 extensions:X509v3 CRL Distribution Points:URI:http://4.4.4.133:447/myca.crlSignature Algorithm: sha1WithRSAEncryption836213A4 F2F74C1A 50F4100D B764D6CEB30C0133 C4363F2F 73454D51 E9F95962EDE9E590 E7458FA6 765A0D3F C4047BC29C391FF0 7383C4DF 9A0CCFA9 231428AF987B029C C857AD96 E4C92441 9382E7988FCC1E4A 3E598D81 96476875 E2F86C3375B51661 B6556C5E 8F546E97 5197734BC8C29AC7 E427C8E4 B9AAF5AA 80A75B3CYou can also use some other display commands to view detailed information about the CA certificateand CRLs. Refer to the parts related to display pki certificate ca domain and display pki crl domaincommands in PKI Commands of the Security Volume.Requesting a Certificate from a CA Running Windows 2003 ServerThe CA server runs the Windows 2003 server in this configuration example.Network requirementsConfigure PKI entity Switch to request a local certificate from the CA server.Figure 1-3 Request a certificate from a CA running Windows 2003 serverConfiguration procedure1) Configure the CA serverz Install the certificate server suitesFrom the start menu, select Control Panel > Add or Remove Programs, and then selectAdd/Remove Windows Components > Certificate Services and click Next to begin the installation.z Install the SCEP plug-inAs a CA server running the Windows 2003 server does not support SCEP by default, you need to installthe SCEP plug-in so that the Switch can register and obtain its certificate automatically. After the SCEPplug-in installation completes, a URL is displayed, which you need to configure on the switch as theURL of the server for certificate registration.z Modify the certificate service attributes