mirror of
https://github.com/Fohdeesha/lab-docu.git
synced 2024-12-01 11:33:23 +01:00
admonition attempt v1
This commit is contained in:
parent
afd5b50975
commit
6a465bba6f
@ -33,15 +33,16 @@ web-management https
|
|||||||
|
|
||||||
Once you get an `ssl-certificate creation is successful` message in the console, you'll be able to access the web UI via `https`.
|
Once you get an `ssl-certificate creation is successful` message in the console, you'll be able to access the web UI via `https`.
|
||||||
|
|
||||||
If you want to use your own certificate that is also possible. It's important to remember that the switch [doesn't support PKCS #8](https://community.ruckuswireless.com/t5/Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18554/highlight/true#M686) and this isn't actually [documented anywhere](https://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-securityguide/GUID-E83AC70A-9F89-4209-B6C4-ED5725D4F487.html). You must create certificates using the PKCS #1 format. If you try to use PKCS #8 (the default for openssl), you'll get certificate parsing errors.
|
??? info
|
||||||
|
If you want to use your own certificate that is also possible. It's important to remember that the switch [doesn't support PKCS #8](https://community.ruckuswireless.com/t5/Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18554/highlight/true#M686) and this isn't actually [documented anywhere](https://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-securityguide/GUID-E83AC70A-9F89-4209-B6C4-ED5725D4F487.html). You must create certificates using the PKCS #1 format. If you try to use PKCS #8 (the default for openssl), you'll get certificate parsing errors.
|
||||||
|
|
||||||
The ICX6610 again doesn't support keys larger than 2048 bits. This example assumes you want to create your own CA and sign with it.
|
The ICX6610 again doesn't support keys larger than 2048 bits. This example assumes you want to create your own CA and sign with it.
|
||||||
|
|
||||||
1. Create new Root CA
|
1. Create new Root CA
|
||||||
```
|
```
|
||||||
pass='{{ pass }}' \
|
pass='{{ pass }}' \
|
||||||
name='{{ name }}' \
|
name='{{ name }}' \
|
||||||
openssl req \
|
openssl req \
|
||||||
-newkey rsa:4096 \
|
-newkey rsa:4096 \
|
||||||
-sha512 \
|
-sha512 \
|
||||||
-passin pass:"${pass}" \
|
-passin pass:"${pass}" \
|
||||||
@ -52,19 +53,19 @@ openssl req \
|
|||||||
-out "$name"Root.crt \
|
-out "$name"Root.crt \
|
||||||
-subj "/CN="$name" Root CA" \
|
-subj "/CN="$name" Root CA" \
|
||||||
-days 3650
|
-days 3650
|
||||||
```
|
```
|
||||||
|
|
||||||
2. Generate key in PKCS#1 format. Use the `-traditional`, see [openssl-genrsa](https://www.openssl.org/docs/manmaster/man1/openssl-genrsa.html) for more details.
|
2. Generate key in PKCS#1 format. Use the `-traditional`, see [openssl-genrsa](https://www.openssl.org/docs/manmaster/man1/openssl-genrsa.html) for more details.
|
||||||
```
|
```
|
||||||
openssl genrsa -traditional -out keyfile 2048
|
openssl genrsa -traditional -out keyfile 2048
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Create certificate sign request
|
3. Create certificate sign request
|
||||||
```
|
```
|
||||||
name='{{ name }}' \
|
name='{{ name }}' \
|
||||||
C='{{ country }}' \
|
C='{{ country }}' \
|
||||||
ST='{{ state/province }}' \
|
ST='{{ state/province }}' \
|
||||||
openssl req \
|
openssl req \
|
||||||
-new \
|
-new \
|
||||||
-sha512 \
|
-sha512 \
|
||||||
-key keyfile \
|
-key keyfile \
|
||||||
@ -73,12 +74,12 @@ openssl req \
|
|||||||
-reqexts SAN \
|
-reqexts SAN \
|
||||||
-extensions SAN \
|
-extensions SAN \
|
||||||
-config <(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")
|
-config <(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")
|
||||||
```
|
```
|
||||||
|
|
||||||
4. Sign certificate request
|
4. Sign certificate request
|
||||||
```
|
```
|
||||||
name='{{ name }}' \
|
name='{{ name }}' \
|
||||||
openssl x509 \
|
openssl x509 \
|
||||||
-req \
|
-req \
|
||||||
-in certsignreq.csr \
|
-in certsignreq.csr \
|
||||||
-CA "$name"Root.crt \
|
-CA "$name"Root.crt \
|
||||||
@ -90,15 +91,15 @@ openssl x509 \
|
|||||||
-extensions v3_ext \
|
-extensions v3_ext \
|
||||||
-extensions SAN \
|
-extensions SAN \
|
||||||
-extfile <(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")
|
-extfile <(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")
|
||||||
```
|
```
|
||||||
|
|
||||||
5. Install your own certificate via tftp
|
5. Install your own certificate via tftp
|
||||||
```
|
```
|
||||||
ip ssl cert-key-size 2048
|
ip ssl cert-key-size 2048
|
||||||
ip ssl certificate-data-file tftp 192.168.1.51 certfile
|
ip ssl certificate-data-file tftp 192.168.1.51 certfile
|
||||||
ip ssl private-key-file tftp 192.168.1.51 keyfile
|
ip ssl private-key-file tftp 192.168.1.51 keyfile
|
||||||
web-management https
|
web-management https
|
||||||
```
|
```
|
||||||
|
|
||||||
You should enable authentication for telnet access:
|
You should enable authentication for telnet access:
|
||||||
```
|
```
|
||||||
|
Loading…
Reference in New Issue
Block a user