No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


Configuration Guide - Security

S7700 and S9700 V200R011C10

This document describes the configurations of Security, including ACL, reflective ACL, local attack defense, MFF, attack defense, traffic suppression and storm control, ARP security, port security, DHCP snooping, ND snooping, PPPoE+, IPSG, SAVI, URPF, keychain, separating the management plane from the service plane, security risks.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
(Optional) Installing the Local Certificate

(Optional) Installing the Local Certificate


The downloaded local certificate must be imported into the device memory to take effect. The device will store the imported certificate file to the ca_config.ini file in the default directory and automatically load the certificate file after restarting.


The local certificate has been downloaded, and the certificate file has been stored to the device storage.


To prevent a failure to install the local certificate, ensure that the certificate file size does not exceed 1 MB.

You need to manually install the local certificate only when the local certificate is applied offline. When the SCEP method is configured, the device automatically downloads the local certificate.


  1. Run system-view

    The system view is displayed.

  2. Run pki import-certificate local realm realm-name { der | pkcs12 | pem } [ filename filename ] [ replace ] [ no-check-validate ] [ no-check-hash-alg ]

    Or run pki import-certificate local realm realm-name pkcs12 filename filename [ no-check-validate ] [ no-check-hash-alg ] password password

    The local certificate is imported into the device memory.

    A key pair file may be included in the certificate file, or exist independently of the certificate file. The import methods are different.

    • A certificate file contains a key pair file.

      Run the pki import rsa-key-pair command to import the certificate and key pair files simultaneously.


      If a certificate file contains a key pair file, the pki import-certificate command imports only the certificate file, but not the key pair file. To import the key pair file, run the pki import rsa-key-pair command after the pki import-certificate command.

    • The key pair file is independent of the certificate file.

      1. Import the certificate file.

        Run the pki import-certificate command.

      2. Import the key pair file.

        Run the pki import rsa-key-pair command.


    If you do not know the format of the certificate you want to import, configure each format in turn and check whether the certificate is successfully imported. If the certificate format is not specified, the system automatically detects the certificate format and imports it.

  3. (Optional) Run pki set-certificate expire-prewarning day

    The expiry prewarning time of the local certificate in the device memory is configured.

    The default expiry prewarning time of the local certificate in the device memory is 7 days.

Follow-up Procedure

To copy the local certificate to another device, run the pki export-certificate local realm realm-name { pem | pkcs12 } command. Subsequently, the local certificate is exported into the device storage. Subsequently, the local certificate can be obtained through FTP or SFTP.

Verifying the Configuration

Run the display pki certificate local realm realm-name command to check the loaded local certificate.

Updated: 2019-09-23

Document ID: EDOC1000178319

Views: 150434

Downloads: 82

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next