0
Unlike Cisco IOS routers, which by default don't allow RSA private keys to be exported from NVRAM, Cisco ASAs don't protect private keys. But there's no command (of which I'm aware) to directly export the keys either.
Sometimes you need to squirrel away those keys. You can do it by getting a certificate that uses the keys, then exporting a certificate bundle (with private key included). Here's how.
First, create a key:
crypto key generate rsa label mykey modulus 2048
Next, create a trustpoint which references the key, and generate a self-signed certificate:
crypto ca trustpoint throwaway
keypair mykey
enrollment self
crypto ca enroll throwaway noconfirm
Now the
throwaway trustpoint has a certificate. Export that certificate to the terminal.
no terminal pager
crypto ca export throwaway pkcs12 <passphrase>
Save the blob of text including the begin/end lines. The blob is a PKCS12 bundle encrypted using the passphrase above and then base64 encoded. Be sure to save the encryption passphrase.
-----BEGIN PKCS12-----
MIIJZwIBAzCCCSEGCSqGSIb3DQEHAaCCCRIEggkOMIIJCjCCCQYGCSqGSIb3DQEH
BqCCCPcwggjzAgEAMIII7AYJKoZIhvcNAQcBMBsGCiqGSIb3DQEMAQMwDQQI4KTD
...etc...
ru1WrVnO7wFa+83BK8D+aQ7UedzQuU6NOiDrjPR0w8uWSLwKmmSVgnZN4BEwPTAh
MAkGBSsOAwIaBQAEFGA2bfp4y+a/R29RZ9TA8sCUSZ+jBBRvppgVbM8rBbW62096
L/HnJErexgICBAA=
-----END PKCS12-----
We no longer need the certificate or the
throwaway trustpoint in which it's stored. Kill it. The private key will survive.
no crypto ca trustpoint throwaway noconfirm
The easiest way to
Continue reading