This command sets and displays the Secure Sockets Layer (SSL) status of the advanced management module.
Function | What it does | Command | Valid targets |
---|---|---|---|
Display management module SSL status | Displays the SSL status of the specified management module. This status includes information about SSL certificates. | sslcfg |
where x is the primary or standby management-module bay number. |
Set SSL certificate handling for standby management module | Enables or disables use of an additional SSL certificate
for the standby management module. If disabled, the standby management
module uses the same SSL certificate as the primary management module.
Note: An additional SSL certificate can
only be configured when management module advanced failover is set
to "swap" and the standby management module has a valid SSL certificate
set up.
|
sslcfg
-ac
state
where state is:
This command can only be run by users who have
one or more of the following command authorities:
|
where x is the standby management-module bay number. |
Set SSL state for management module web server | Enables or disables SSL for the management module
web server.
Note: The SSL for the management module web server can
only be enabled if a valid SSL certificate is set up.
|
sslcfg
-server
state
where state is enabled or disabled. This command can only be run by users who have one or more
of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Set SSL state for LDAP client | Enables or disables SSL for the LDAP client.
Note: The
SSL for the LDAP client can only be enabled if a valid SSL certificate
is set up.
|
sslcfg
-client
state
where state is enabled or disabled. This command can only be run by users who have one or more
of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Generate self-signed certificate | Generates a self-signed certificate for the management
module web server or the LDAP client. The following values must be set when generating a self-signed certificate:
The following optional values can be set when generating a self-signed certificate:
|
sslcfg
-cert
type
-c
country
-sp
"state"
-cl
"city"
-on
"org"
-hn
hostname
-cp
"name"
-ea
email
-ou
"org_unit" -s "surname"
-gn
"given_name"
-in
"initial"
-dq
"dn_qualifier"
where
the following required options are:
where the following optional options are:
(continued on next page)
|
where x is the primary or standby management-module bay number. |
Generate self-signed certificate
(continued) |
This command can only be run by users
who have one or more of the following command authorities:
|
||
Generate CSR | Generates a certificate signing request (CSR) for
the management module web server or the LDAP client. The following values must be set when generating a CSR:
The following optional values can be set when generating a CSR:
(continued on next page) |
sslcfg
-csr
type
-c
country
-sp
"state"
-cl
"city"
-on
"org"
-hn
hostname
-cp
"name"
-ea
email
-ou
"org_unit"
-s
"surname"
-gn
"given_name"
-in
"initial"
-dq
"dn_qualifier"
-cpwd
password
-un
"un_name"
where
the following required options are:
where the following optional options are:
(continued on next page) |
where x is the primary or standby management-module bay number. |
Generate CSR
(continued) |
|
Note: Arguments that must be quote-delimited are shown
in quotation marks.
This command can only be run
by users who have one or more of the following command authorities:
|
|
Download certificate file | Downloads the specified certificate file. The IP address of the TFTP server for downloading an SSL self-signed certificate or CSR must be set using the -i command. The file name for downloading an SSL self-signed certificate or CSR can be set using the -l command. If no file name is specified, the default file name for the file will be used. |
sslcfg
-dnld -cert|-csr
type
-l
filename
-i
ipaddress
where:
This command can only be run by users who have
one or more of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Import certificate file | Import (upload) the specified certificate file. The IP address of the TFTP server for uploading an SSL self-signed certificate must be set using the -i command. The file name for uploading an SSL self-signed certificate can be set using the -l command. |
sslcfg
-upld -cert
type
-i
ipaddress
-l
filename
where:
This command can only be run by users who have
one or more of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Import/download/remove trusted certificate 1 | Perform the specified operation on trusted certificate
1 for the SSL client. Valid operations are:
The IP address of the TFTP server for uploading or downloading a trusted certificate must be set using the -i command. The file name for uploading or downloading a trusted certificate can be set using the -l command. |
sslcfg
-tc1
operation
where operation is:
Note: The -tc1 option must be used with the following
options:
where:
This command can only be run by users
who have one or more of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Import/download/remove trusted certificate 2 | Perform the specified operation on trusted certificate
2 for the SSL client. Valid operations are:
The IP address of the TFTP server for uploading or downloading a trusted certificate must be set using the -i command. The file name for uploading or downloading a trusted certificate can be set using the -l command. |
sslcfg
-tc2
operation
where operation is:
Note: The -tc2 option must be used with the following
options:
where:
This command can only be run by users
who have one or more of the following command authorities:
|
where x is the primary or standby management-module bay number. |
Import/download/remove trusted certificate 3 | Perform the specified operation on trusted certificate
3 for the SSL client. Valid operations are:
The IP address of the TFTP server for uploading or downloading a trusted certificate must be set using the -i command. The file name for uploading or downloading a trusted certificate can be set using the -l command. For importing a certificate "-l <filename>" is required. |
sslcfg
-tc3
operation
where operation is:
Note: The -tc3 option must be used with the following
options:
where:
This command can only be run by users
who have one or more of the following command authorities:
|
where x is the primary or standby management-module bay number. |
sslcfg
The following example shows the information that is returned from this command:
system:mm[1]> sslcfg
-server disabled
-client disabled
SSL Server Certificate status:
A CA-signed certificate is installed
SSL Client Certificate status:
No certificate has been generated
SSL Client Trusted Certificate status:
Trusted Certificate 1: Not available
Trusted Certificate 2: Not available
Trusted Certificate 3: Not available
system:mm[1]>