In many enterprise or lab environments, setting up a dedicated PKI infrastructure can be resource-intensive. Cisco IOS routers provide the capability to act as lightweight Certificate Authorities (CAs), allowing for certificate issuance and management for VPNs and secure communication without relying on external PKI services. Here’s how to set it up.

Step 1: Set the Clock or Configure NTP

Before starting any PKI configuration, the router’s clock must be accurately set. Certificates depend heavily on proper timekeeping for validation and expiration.

You can either set the time manually:

clock set

Or synchronize with an NTP server:

ntp server ip-address

Step 2: Generate Exportable RSA Keys

Next, you’ll generate the keys that the router will use for signing certificates. These must be marked as exportable if you intend to reuse or back them up later:

crypto key generate rsa general-keys exportable label name 1024

To export the key and store it in NVRAM:

crypto key export rsa label-name pem url nvram: 3des password

Step 3: Enable Required Services

The router must run an HTTP server to serve certificate requests:

ip http server

Then, you can enable and configure the PKI server:

crypto pki server name
database level minimum
database url nvram:
issuer-name cn=name l=location c=country
lifetime certificate number-of-days
grant auto
no shutdown

You’ll be prompted to set a password that secures the CA functionality.

Step 4: Save and Verify

Don’t forget to save your configuration:

write mem

Finally, verify that the PKI server is active and running:

show crypto pki server

With this setup, your router can now issue and manage certificates for other network devices, making it a viable internal CA in testbeds or branch office deployments. It’s a quick and efficient way to deploy secure communication in environments where a full PKI solution isn’t practical.