HP Cisco MDS 9120 Cisco MDS 9000 Family Storage Media Encryption Configuration - Page 247

Provisioning Self-Sign Certificates, Configuring SSL for Cisco SME

Page 247 highlights

Send documentation comments to [email protected] C A P P E N D I X Provisioning Self-Sign Certificates The Secure Socket Layer (SSL) protocol secures the network communication and allows data to be encrypted before transmission and provides security. Many application servers and Web servers support the use of keystores for SSL configuration. This appendix also includes information on how to select the RSA Key Manager. This appendix includes the following sections: • Configuring SSL for Cisco SME, page C-1 • Generating and Installing Self-Signed Certificates, page C-4 • Editing SSL Settings in Cisco Fabric Manager Web Client, page C-6 Configuring SSL for Cisco SME A certificate is an electronic document that you use to identify a server, a company, or some other entity and to associate that identity with a public key. Certificate authority (CA) are entities that validate identities and issue certificates. The certificate that the CA issues binds a particular public key to the name of the entity that the certificate identifies (such as the name of a server or device). Only the public key that the certificate certifies works with the corresponding private key that is possessed by the entity that the certificate identifies. Certificates help prevent the use of fake public keys for impersonation. You must install a third-party tool such as the OpenSSL application to generate a certificate request. In Windows, by default, openssl.exe is located at c:\openssl\bin. Before configuring the SSL, consider the following: • Ensure that the time in all the switches, Fabric Manager server and the system running the OpenSSL commands, are all synchronized. • Provide different identities for the CA certificate and KMC certificate. • Only JRE1.6 JAVA keytool is supported for importing PKCS12 certificates to Java Keystores (JKS) files. This section describes the following topics: • Creating CA Certificates, page C-2 • Generating KMC Certificate, page C-4 OL-18091-01, Cisco MDS NX-OS Release 4.x Cisco MDS 9000 Family Storage Media Encryption Configuration Guide C-1

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280

Send documentation comments to [email protected]
C-1
Cisco MDS 9000 Family Storage Media Encryption Configuration Guide
OL-18091-01, Cisco MDS NX-OS Release 4.x
APPENDIX
C
Provisioning Self-Sign Certificates
The Secure Socket Layer (SSL) protocol secures the network communication and allows data to be
encrypted before transmission and provides security. Many application servers and Web servers support
the use of keystores for SSL configuration.
This appendix also includes information on how to select the RSA Key Manager.
This appendix includes the following sections:
Configuring SSL for Cisco SME, page C-1
Generating and Installing Self-Signed Certificates, page C-4
Editing SSL Settings in Cisco Fabric Manager Web Client, page C-6
Configuring SSL for Cisco SME
A certificate is an electronic document that you use to identify a server, a company, or some other entity
and to associate that identity with a public key.
Certificate authority (CA) are entities that validate identities and issue certificates. The certificate that
the CA issues binds a particular public key to the name of the entity that the certificate identifies (such
as the name of a server or device). Only the public key that the certificate certifies works with the
corresponding private key that is possessed by the entity that the certificate identifies. Certificates help
prevent the use of fake public keys for impersonation.
You must install a third-party tool such as the OpenSSL application to generate a certificate request. In
Windows, by default, openssl.exe is located at c:\openssl\bin.
Before configuring the SSL, consider the following:
Ensure that the time in all the switches, Fabric Manager server and the system running the OpenSSL
commands, are all synchronized.
Provide different identities for the CA certificate and KMC certificate.
Only JRE1.6 JAVA keytool is supported for importing PKCS12 certificates to Java Keystores (JKS)
files.
This section describes the following topics:
Creating CA Certificates, page C-2
Generating KMC Certificate, page C-4