Scep
These scenarios show how to configure the SCEP protocol to retrieve certificates from a PKI server.
Test SCEP Protocol With Linux PKI
Description
In this scenario, the SCEP protocol is used to retrieve digital certificates (X509) from a Linux PKI server.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set protocols static route 192.168.212.0/22 next-hop 10.215.168.1 set system certificate scep csr CSR cgi-path /scep set system certificate scep csr CSR cipher aes set system certificate scep csr CSR digest sha256 set system certificate scep csr CSR distinguished-names CN=MyUserCert set system certificate scep csr CSR encrypted-password U2FsdGVkX190+2WPPV1rC0dMW1214n8ZXaJA2H9n8VM= set system certificate scep csr CSR port 8080 set system certificate scep csr CSR url 'http://10.215.168.1' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Ping IP address 10.215.168.1 from DUT0:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.183 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.183/0.183/0.183/0.000 ms
Step 3: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:
ca\s+Valid usercert\s+ValidShow output
------------------------------------------------------------------------------------------------- Certificate Status Usage NotBefore NotAfter ------------------------------------------------------------------------------------------------- ca Valid Encipherment & Signature Apr 16 09:19:39 2025 GMT Apr 11 09:19:39 2045 GMT usercert Valid - Feb 19 12:47:12 2026 GMT Feb 19 12:47:12 2027 GMT
Step 4: Run command pki show certificate running://auth/certificates/scep/CSR/ca/ca.der at DUT0 and check if output contains the following tokens:
Subject: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ESShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 7c:28:60:8a:6f:42:5d:c8:44:f0:10:0d:61:e5:ca:40:11:bc:ea:f2 Signature Algorithm: sha256WithRSAEncryption Issuer: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Validity Not Before: Apr 16 09:19:39 2025 GMT Not After : Apr 11 09:19:39 2045 GMT Subject: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:de:b7:3b:d9:9b:e3:d3:57:9b:b0:33:67:c0:40: 4f:45:84:ea:c2:35:a6:08:3b:3a:fd:6d:fa:d7:2b: 3d:7f:1c:a1:92:15:08:8b:5c:02:ec:6a:66:46:c5: 6f:7f:9b:9d:c3:86:e1:97:47:9b:5e:ea:96:5b:bf: 68:35:96:4f:6e:64:c6:7d:f6:da:6b:f9:bf:98:b1: 32:63:ae:f4:5b:2f:cd:6d:d7:ef:db:01:12:b0:a4: 54:95:6e:e8:84:4a:0a:f1:13:83:13:a1:7a:1d:f4: 06:3f:e3:53:5d:9f:68:a1:a0:5c:51:05:ba:8c:da: 00:11:64:4b:e8:37:c3:70:43:9c:16:dd:46:fb:34: e4:3c:ae:a4:9a:a1:da:cf:a1:f5:93:13:a6:0e:68: 51:31:f7:26:63:a3:8b:47:c3:94:e4:34:d2:b0:36: cf:22:e5:81:dd:a4:01:e8:79:08:37:ad:7a:b9:da: 24:37:cc:53:f4:51:f8:b5:67:09:15:63:52:60:7f: b0:e2:f0:38:cd:3c:13:42:81:5f:e2:dd:e2:c5:37: f3:ef:05:8c:85:2f:2a:0a:f4:94:2f:70:56:7f:7d: a9:f6:ca:69:0b:a7:40:e1:fa:bc:f0:f4:01:7a:76: 55:f4:2a:57:43:8b:f1:87:58:f2:f4:db:23:26:33: f8:4f Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C X509v3 Authority Key Identifier: keyid:D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C DirName:/CN=Teldat-PKI/O=Teldat/L=Madrid/C=ES serial:7C:28:60:8A:6F:42:5D:C8:44:F0:10:0D:61:E5:CA:40:11:BC:EA:F2 X509v3 Basic Constraints: critical CA:TRUE, pathlen:0 X509v3 Key Usage: critical Digital Signature, Key Encipherment, Certificate Sign, CRL Sign Signature Algorithm: sha256WithRSAEncryption Signature Value: 5e:0d:47:96:a2:24:38:fa:62:5b:0c:c2:4e:59:23:79:40:1b: 88:d1:63:11:0b:ce:bc:63:46:cd:70:33:52:75:4b:85:c1:39: be:3c:ce:7c:66:53:63:b4:39:07:ec:ef:52:fe:fa:dc:c1:fb: e4:51:61:28:58:4f:90:71:83:50:7d:62:a9:16:fa:45:89:08: 5f:39:43:6a:b1:bb:ad:4e:6f:50:bc:07:4f:1c:5b:07:df:63: ec:44:20:48:b6:97:00:e2:9d:8e:42:9e:96:5f:71:7a:43:96: de:fd:66:6b:45:85:5d:e4:dc:bf:e9:34:64:4f:3a:7b:33:a0: 54:80:3b:9a:5b:1f:3f:3f:1c:09:a3:8e:d8:b6:2a:ba:b2:07: 87:fa:0f:a5:69:41:06:b1:14:6f:09:4f:bb:88:60:87:70:83: 31:73:ed:2a:03:ca:3c:19:0a:b2:24:61:c6:ce:09:97:ac:6e: da:cb:47:88:c5:f5:a7:74:d2:96:e0:cc:c3:b6:b7:f6:64:9f: ad:1c:7f:36:fd:39:7c:57:54:a5:e9:8a:82:90:4d:cd:74:99: 27:4d:f6:62:a6:96:c5:6e:d3:02:ec:c1:4d:5f:46:b6:82:75: 12:61:d7:a3:d6:70:f6:35:9d:9c:30:06:84:af:b2:cb:a5:a0: 5e:d3:1d:6c
Step 5: Run command pki show certificate running://auth/certificates/scep/CSR/user/cert at DUT0 and check if output contains the following tokens:
Subject: CN = MyUserCertShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 2 (0x2) Signature Algorithm: sha256WithRSAEncryption Issuer: CN = Teldat-PKI, O = Teldat, L = Madrid, C = ES Validity Not Before: Feb 19 12:47:12 2026 GMT Not After : Feb 19 12:47:12 2027 GMT Subject: CN = MyUserCert Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:db:f8:56:a4:87:bc:b2:e0:92:7f:b0:8c:9a:c0: a8:7a:47:e0:36:6b:5b:16:11:8d:cc:f6:e9:d0:d0: c3:61:2c:50:11:ba:0c:56:9e:b7:15:27:68:a2:f6: 1b:d6:1e:ac:f4:fa:60:e3:15:c3:7e:5e:e8:19:60: e5:ef:35:e3:1d:ee:24:6b:15:ca:4b:88:a0:88:07: 49:58:78:40:a2:74:0b:d1:99:9e:a0:69:92:37:74: d2:40:80:ca:d7:3c:17:67:f9:94:08:42:9d:cf:c8: 62:6b:85:be:54:fb:a0:a2:0a:c5:96:1e:c3:b3:71: 79:60:b0:4b:3b:8a:1b:38:89:ac:d5:3f:b6:59:27: d1:f5:8c:e6:29:0e:32:07:0d:16:9f:5e:5d:b2:27: 8e:3a:05:a2:2f:51:49:38:01:f4:43:83:44:ef:ec: f0:bf:ed:5e:31:a1:3a:e2:93:c0:e5:49:85:57:b0: b5:d2:9e:2a:7d:d8:c6:16:25:87:44:f4:79:e4:e9: 14:39:16:7d:5a:7e:46:dc:10:38:2a:86:f7:c8:26: 1f:36:e8:60:2c:62:b7:cf:3d:cc:20:fc:02:f2:bf: 70:d7:49:56:fb:1e:1a:10:6f:d2:02:ea:af:a6:32: 4c:e1:a8:5a:f7:b8:2b:b2:f7:d1:9e:30:0e:02:52: b9:c5 Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Key Usage: critical Digital Signature X509v3 Extended Key Usage: TLS Web Client Authentication X509v3 Subject Key Identifier: DD:CE:3F:2C:90:FE:D8:4D:F5:EC:73:83:27:E4:CC:99:C0:19:60:55 X509v3 Authority Key Identifier: D3:97:2E:56:37:6A:89:77:01:D4:E3:42:0D:EC:E7:10:79:9C:E8:7C Signature Algorithm: sha256WithRSAEncryption Signature Value: bc:dd:8c:4f:67:c4:b4:24:17:2c:b1:6b:1e:cc:52:35:75:6f: a7:72:63:a6:e7:fd:e2:f3:73:b8:00:e8:10:c6:52:6a:5a:fa: 51:a9:ac:a7:e1:99:8e:72:f9:e1:fe:2e:19:33:8a:ad:2e:1a: 33:00:0b:89:4b:d7:e4:c8:8a:26:b2:38:fe:fc:48:06:e2:d0: fa:1b:0e:3c:78:0a:15:50:52:cd:9d:d1:bc:da:bf:5e:46:4b: a4:83:c5:a9:a2:91:ad:c9:d8:59:75:66:f6:95:5d:48:d8:94: c1:b8:33:b2:6c:98:3d:5d:c2:18:8b:69:c6:3e:72:2a:46:dd: 31:d2:a7:7b:7e:ce:26:2a:4d:3a:5e:f7:04:cb:52:f8:2d:7b: 5a:f6:9e:9e:eb:f2:75:2c:2d:2f:1a:34:6b:fd:d6:ad:64:ed: 15:c8:5f:70:3d:7d:fe:69:30:e1:93:7b:81:98:3c:51:cb:b4: 2e:35:db:ac:58:ff:09:60:6f:15:87:8d:66:ba:87:e3:00:e9: 53:dd:36:3d:2f:e9:df:a4:c1:fb:f6:de:36:71:40:ec:ed:63: 15:23:f8:e8:c1:9f:c0:6c:21:57:17:f2:d3:b0:86:72:37:fa: 6a:7e:27:fe:26:69:ec:42:fd:fc:8d:14:38:c7:a5:6b:bd:08: 41:8d:40:d1
Test SCEP Protocol With Windows Server PKI
Description
In this scenario, the SCEP protocol is used to retrieve digital certificates (X509) from a Windows PKI server.
Scenario
Step 1: Set the following configuration in DUT0 :
set interfaces ethernet eth0 address 10.215.168.64/24 set protocols static route 192.168.212.0/22 next-hop 10.215.168.1 set system certificate scep csr CSR cgi-path CertSrv/mscep/mscep.dll/pkiclient.exe set system certificate scep csr CSR distinguished-names CN=MyUserCert set system certificate scep csr CSR encrypted-password U2FsdGVkX18bfLhvgrIgOB7Xszkj3htHmkLYDMvQH5WwHn2KuHxXgio1Wt3UygVZ7BYCUZedn1rXV9adGxuEGQ== set system certificate scep csr CSR url 'http://192.168.213.25/' set system login user admin authentication encrypted-password '$6$GSjsCj8gHLv$/VcqU6FLi6CT2Oxn0MJQ2C2tqnRDrYKNF8HIYWJp68nvXvPdFccDsT04.WtigUONbKYrgKg8d6rEs8PjljMkH0'
Step 2: Ping IP address 10.215.168.1 from DUT0:
admin@DUT0$ ping 10.215.168.1 count 1 size 56 timeout 1Show output
PING 10.215.168.1 (10.215.168.1) 56(84) bytes of data. 64 bytes from 10.215.168.1: icmp_seq=1 ttl=64 time=0.192 ms --- 10.215.168.1 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.192/0.192/0.192/0.000 ms
Step 3: Ping IP address 192.168.213.25 from DUT0:
admin@DUT0$ ping 192.168.213.25 count 1 size 56 timeout 1Show output
PING 192.168.213.25 (192.168.213.25) 56(84) bytes of data. 64 bytes from 192.168.213.25: icmp_seq=1 ttl=126 time=0.574 ms --- 192.168.213.25 ping statistics --- 1 packets transmitted, 1 received, 0% packet loss, time 0ms rtt min/avg/max/mdev = 0.574/0.574/0.574/0.000 ms
Step 4: Run command pki scep show CSR at DUT0 and check if output matches the following regular expressions:
ca\s+Valid usercert\s+ValidShow output
------------------------------------------------------------------------------------- Certificate Status Usage NotBefore NotAfter ------------------------------------------------------------------------------------- ca Valid Signature Jan 9 09:34:41 2026 GMT Jan 9 09:44:41 2056 GMT ra Valid Encipherment Jan 9 09:37:26 2026 GMT Jan 9 09:37:26 2028 GMT ra-2 Valid Signature Jan 9 09:37:25 2026 GMT Jan 9 09:37:25 2028 GMT usercert Valid - Feb 19 12:18:11 2026 GMT Feb 19 12:28:11 2028 GMT
Step 5: Run command pki show certificate running://auth/certificates/scep/CSR/ca/ca.der at DUT0 and check if output contains the following tokens:
Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CAShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 2e:aa:77:9e:fd:8d:47:8d:42:5f:96:57:64:8a:da:d1 Signature Algorithm: sha256WithRSAEncryption Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA Validity Not Before: Jan 9 09:34:41 2026 GMT Not After : Jan 9 09:44:41 2056 GMT Subject: DC = com, DC = scep, CN = scep-TELDATPKI-CA Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:be:22:9c:cd:53:99:06:1b:31:57:cd:72:1b:d7: 5d:99:b4:e2:e1:88:80:d4:40:53:49:be:ff:e0:5b: 8b:41:8c:96:e8:99:cd:19:ab:98:4c:99:77:ad:01: fc:51:cf:ea:d8:43:fc:5b:d2:dd:b5:05:04:ae:01: 28:e9:53:5d:bb:d2:65:71:d9:69:3c:04:4d:6b:6e: 8b:95:92:e4:e7:84:57:90:b3:5e:1f:76:34:7f:15: e2:fb:c0:78:bb:ec:a5:be:2f:33:9e:98:06:f1:4c: 1f:cc:ee:85:c2:f1:8f:3c:23:52:a2:94:af:0e:b8: d2:e3:0c:b7:07:49:b9:91:87:3e:76:89:61:f0:88: 4c:2f:da:6b:b9:75:93:6e:e4:e2:f1:19:48:00:f7: af:1b:70:19:15:2b:30:b3:78:24:dc:14:c4:e8:a0: 61:f9:68:09:7d:e9:3e:6f:e0:a3:44:d5:43:f8:78: aa:5f:a8:7a:3a:7c:2c:4e:21:69:24:be:2f:cb:57: bd:60:e8:b9:a5:3b:ad:0c:7b:d9:8d:82:3e:13:96: 8b:59:5a:2b:ec:b6:63:33:21:69:a5:30:b6:bb:84: e9:80:8d:db:3c:94:f7:52:05:76:6a:ed:d6:03:24: d8:97:46:a4:15:41:4d:17:98:7d:20:64:ac:fb:e9: 30:1d Exponent: 65537 (0x10001) X509v3 extensions: 1.3.6.1.4.1.311.20.2: ...C.A X509v3 Key Usage: critical Digital Signature, Certificate Sign, CRL Sign X509v3 Basic Constraints: critical CA:TRUE X509v3 Subject Key Identifier: 18:DA:43:2C:11:47:FC:1A:DA:19:D4:6C:8B:2D:58:AA:75:ED:17:94 1.3.6.1.4.1.311.21.1: ... Signature Algorithm: sha256WithRSAEncryption Signature Value: 3b:f8:53:b9:17:78:98:fa:4a:63:a8:5b:57:bc:f6:67:d8:47: 48:8a:22:2f:d8:39:22:44:c9:f8:aa:fd:e8:81:13:c4:5f:9b: b2:72:0a:35:b1:0c:64:ff:ff:89:05:f0:d7:2a:e4:5f:da:6b: 7b:90:88:5e:6c:77:e5:17:83:19:43:10:35:f8:b5:e3:b8:b5: 16:c1:79:5e:cc:71:00:91:6a:aa:b7:7e:e8:35:99:b3:74:c1: b7:d9:93:8c:6b:4e:64:5a:0a:aa:09:ce:00:d6:f2:f0:f6:87: ec:cd:dc:d0:07:d5:cb:6d:7f:34:72:80:7b:8c:71:f3:d8:f6: a4:38:45:0e:19:79:bd:07:d6:91:a0:4f:4f:2e:55:f1:ca:f7: f3:b1:94:33:7b:f0:76:2b:10:d6:9b:49:ef:96:83:f3:f5:2e: b3:c4:48:13:2f:19:f3:18:7f:4c:7a:09:79:3b:52:94:d9:86: 65:58:32:34:ba:89:6e:54:99:ab:12:7b:f5:3d:61:f3:39:22: 08:ef:7b:77:ba:95:7e:8e:ca:51:4d:80:45:2b:43:d8:b1:37: fb:0c:69:7a:c8:5c:dc:4c:16:5f:a1:09:5c:d6:85:ed:93:76: fa:56:67:fe:fc:97:3c:8d:f8:3c:39:d7:31:07:e6:69:42:3d: 3d:d2:86:1e
Step 6: Run command pki show certificate running://auth/certificates/scep/CSR/user/cert at DUT0 and check if output contains the following tokens:
Subject: CN = MyUserCertShow output
Certificate: Data: Version: 3 (0x2) Serial Number: 11:00:00:08:cb:66:66:46:7e:e5:86:cd:3a:00:00:00:00:08:cb Signature Algorithm: sha256WithRSAEncryption Issuer: DC = com, DC = scep, CN = scep-TELDATPKI-CA Validity Not Before: Feb 19 12:18:11 2026 GMT Not After : Feb 19 12:28:11 2028 GMT Subject: CN = MyUserCert Subject Public Key Info: Public Key Algorithm: rsaEncryption Public-Key: (2048 bit) Modulus: 00:ba:78:18:61:75:40:67:bc:b0:dc:7a:c1:44:af: 02:47:5f:53:df:a6:ce:60:4b:aa:53:bb:b1:08:28: e8:83:ad:85:13:b4:b2:0f:0a:e2:90:ba:3e:a4:04: e9:dd:89:01:8f:27:60:9b:c3:4f:73:28:9a:ec:ee: 21:4c:4d:6e:53:cb:9f:a7:f3:1c:bf:a6:05:97:63: 94:87:7f:5a:52:80:21:3d:e4:12:2b:d0:9c:8e:d9: 9f:01:c8:5b:12:2a:3e:23:e1:48:55:58:90:e1:8d: bb:ef:90:b7:29:cc:f4:af:7e:18:9f:8c:5b:66:a3: d7:7f:1d:54:16:4e:68:6b:ad:d1:2c:a6:83:0e:82: bb:36:77:84:60:70:df:3d:d0:cf:73:b8:99:49:3d: 91:94:16:b8:9a:11:17:53:66:c8:e8:23:d6:a9:bd: e0:ef:af:41:b1:3e:8a:f0:44:8b:1c:44:6a:25:74: 8d:48:be:09:f2:45:fb:6a:b8:de:ea:59:5c:8c:9a: cd:3f:b2:0c:f7:93:85:53:7a:f1:ad:e7:09:56:34: 3e:86:8b:10:9e:7f:12:f5:fd:c3:49:b2:c2:b7:9a: ec:ef:a8:59:44:ca:88:7d:c4:39:9e:a2:45:17:ff: 92:c6:41:c4:19:e8:14:b9:dc:82:44:dd:ee:02:5b: 6e:2d Exponent: 65537 (0x10001) X509v3 extensions: X509v3 Subject Key Identifier: EB:99:FB:EE:56:E9:0B:3A:0B:DD:5D:0F:7E:03:54:07:55:D6:0C:D3 X509v3 Authority Key Identifier: 18:DA:43:2C:11:47:FC:1A:DA:19:D4:6C:8B:2D:58:AA:75:ED:17:94 X509v3 CRL Distribution Points: Full Name: URI:ldap:///CN=scep-TELDATPKI-CA,CN=TeldatPKI,CN=CDP,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?certificateRevocationList?base?objectClass=cRLDistributionPoint Authority Information Access: CA Issuers - URI:ldap:///CN=scep-TELDATPKI-CA,CN=AIA,CN=Public%20Key%20Services,CN=Services,CN=Configuration,DC=scep,DC=com?cACertificate?base?objectClass=certificationAuthority X509v3 Key Usage: critical Digital Signature, Key Encipherment, Data Encipherment 1.3.6.1.4.1.311.21.7: 0..&+.....7.....3......./...(...f<...[...]..d... X509v3 Extended Key Usage: 1.3.6.1.4.1.311.20.1, Microsoft Encrypted File System, Code Signing, Any Extended Key Usage, TLS Web Server Authentication, Signing KDC Response, TLS Web Client Authentication, 1.3.6.1.4.1.311.21.5, 1.3.6.1.4.1.311.20.2.1, 1.3.6.1.5.5.8.2.2 1.3.6.1.4.1.311.21.10: 0y0...+.....7..0.. +.....7 ..0 ..+.......0...U.%.0 ..+.......0...+......0 ..+.......0...+.....7..0.. +.....7...0 ..+....... S/MIME Capabilities: 050...*.H.. ......0...*.H.. ......0...+....0 ..*.H.. .. Signature Algorithm: sha256WithRSAEncryption Signature Value: 10:50:bd:bb:38:15:83:7d:b2:2a:0d:5c:22:c1:a2:43:cf:00: 9f:1d:76:49:e6:eb:be:f4:09:6d:c2:c6:bd:af:0e:65:dc:6b: 17:78:22:be:3a:14:04:36:6a:bf:10:86:b7:d2:20:50:42:53: 21:31:19:91:8d:e5:a3:53:19:11:84:a8:e1:36:6a:3c:a5:05: d7:9a:c6:6f:e0:73:a0:32:b1:9b:ef:dd:08:14:9a:bb:b2:0b: 32:1f:d9:d3:19:8b:ce:5a:19:b9:b2:3d:05:0d:41:1a:e2:8b: 2e:8e:e2:82:c4:b5:c5:0c:98:b3:df:18:d6:1f:f5:ca:4d:32: 51:18:62:eb:1f:e8:3d:4d:97:68:f8:16:56:42:8c:ec:3c:39: 51:6c:06:ee:51:95:18:27:88:28:6a:33:b3:d9:82:de:d1:bb: 51:47:53:a6:ae:80:47:70:fc:78:ef:f6:30:24:85:69:d2:11: 7b:7b:43:c2:16:d5:45:64:f4:99:7a:95:a7:c3:f4:00:ff:4f: bb:fc:ee:68:e7:b3:01:78:75:4f:15:6b:80:b7:a7:df:ce:be: 3d:6f:7b:c6:15:3f:a4:97:d1:5a:a4:e7:53:a1:90:0b:12:d9: 5a:3e:0a:69:2c:d9:33:08:24:5a:46:0f:f8:77:5e:ac:33:08: 40:17:41:76