Lantronix EMG 8500 EMG User Guide - Page 158

Services, Version 3 TLS over TCP, Apply, To con TLS v3 over TCP

Page 158 highlights

8: Services Certificate fingerprints may be required by applications interfacing the SNMP applications of EMG when TLS is used. EMG will display the SHA1 and SHA256 fingerprint of the certificate authority and certificate files when they are uploaded into EMG. The fingerprint of the client certificate must also be configured when authenticating the EMG agent with a client or tool that queries the agent. For information about generating a certificate authority (or root) file, agent (or server) certificate and key, and client certificate and key with OpenSSL, see Creating a Certificate. We recommend you to set the message digest used when creating the certificates to SHA1 or SHA256, depending on the level of security required. When EMG is in FIPS mode, only certificates with a message digest of SHA256 or higher are allowed. To set the message digest used by OpenSSL, in step (1b) of the instructions referenced above, change default in the line below in openssl.cnf to either sha1 or sha256. default_md = default # use public key default MD To configure TLS v3 (over TCP): 1. Click Services tab and select SNMP. The SNMP page appears. 2. In the Version 3 TLS (over TCP) section, enter the following: 3. To save, click Apply. Client Certificate Fingerprint Enter the SHA1 or SHA256 fingerprint of the certificate used by the client or tool that queries the EMG agent. For example, a SHA256 fingerprint is a string of 59 characters: D9:E5:DD:11:58:D2:DF:E0:D9:99:AE:A3:DB:57:24:21:A7:0A:20: 5A CertificateUsername Mapping / String EMG requires a mapping from a field in the certificate used by the client or tool that queries the EMG agent to an SNMP v3 user name used internally by the EMG. This provides an extra layer of security to verify the client's identity. The EMG will extract the designated field from the certificate and match it with what is specified in String. Select among the following fields in the client certificate:  User Name: The SNMP v3 user name. It does not need to be a field in the certificate.  E-mail Address: The email address mentioned in the subjectAltName field of the certificate.  FQDN: The DNS name mentioned in the subjectAltName field of the certificate. For example, abc.lantronix.com.  IP Address: The IP address mentioned in the subjectAltName field of the certificate. For example, 10.0.1.150.  Common Name: The common name mentioned in the certificate. For example, "EMG" or "John Smith". By default, this option is selected.  Any: Indicates that any of the subjectAltName fields in the certificate can be used. For example, if the common name in the certificate is "John Smith", select Common Name for Certificate-Username Mapping. and then enter John Smith in the String field. Certificate Authority Indicates the Certificate Authority used by the agent certificate and the client/traps certificate. Note: The certificate authority, agent certificate and client/traps certificate can be viewed by clicking the View link to the associated the filename. It will also display the SHA1 and SHA256 fingerprint of the certificate. All certificate files can be deleted by clicking the Delete Certificate Files check box. Certificate File for The certificate file for the EMG agent. Agent EMG™ Edge Management Gateway User Guide 158

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

8: Services
EMG™ Edge Management Gateway User Guide
158
Certificate fingerprints may be required by applications interfacing the SNMP applications of EMG
when TLS is used. EMG will display the SHA1 and SHA256 fingerprint of the certificate authority
and certificate files when they are uploaded into EMG. The fingerprint of the client certificate must
also be configured when authenticating the EMG agent with a client or tool that queries the agent.
For information about generating a certificate authority (or root) file, agent (or server) certificate
and key, and client certificate and key with OpenSSL, see
Creating a Certificate
. We recommend
you to set the message digest used when creating the certificates to SHA1 or SHA256, depending
on the level of security required. When EMG is in FIPS mode, only certificates with a message
digest of SHA256 or higher are allowed. To set the message digest used by OpenSSL, in step (1b)
of the instructions referenced above, change
default
in the line below in
openssl.cnf
to
either
sha1
or
sha256
.
default_md = default # use public key default MD
To configure TLS v3 (over TCP):
1.
Click
Services
tab and select
SNMP
. The
SNMP
page appears.
2.
In the
Version 3 TLS (over TCP)
section, enter the following:
3.
To save, click
Apply
.
Client Certificate
Fingerprint
Enter the SHA1 or SHA256 fingerprint of the certificate used by the client or tool that
queries the EMG agent. For example, a SHA256 fingerprint is a string of 59 characters:
D9:E5:DD:11:58:D2:DF:E0:D9:99:AE:A3:DB:57:24:21:A7:0A:20:
5A
Certificate-
Username
Mapping / String
EMG requires a mapping from a field in the certificate used by the client or tool that
queries the EMG agent to an SNMP v3 user name used internally by the EMG. This
provides an extra layer of security to verify the client's identity. The EMG will extract the
designated field from the certificate and match it with what is specified in
String
. Select
among the following fields in the client certificate:
User Name:
The SNMP v3 user name. It does not need to be a field in the
certificate.
E-mail Address:
The email address mentioned in the
subjectAltName
field of
the certificate.
FQDN:
The DNS name mentioned in the
subjectAltName
field of the
certificate. For example, abc.lantronix.com.
IP Address:
The IP address mentioned in the
subjectAltName
field of the
certificate. For example, 10.0.1.150.
Common Name:
The common name mentioned in the certificate. For example,
"EMG" or "John Smith". By default, this option is selected.
Any:
Indicates that any of the
subjectAltName
fields in the certificate can be
used.
For example, if the common name in the certificate is "John Smith", select
Common
Name
for
Certificate-Username Mapping.
and then enter John Smith in the String
field.
Certificate
Authority
Indicates the Certificate Authority used by the agent certificate and the client/traps
certificate.
Note:
The certificate authority, agent certificate and client/traps certificate can be
viewed by clicking the
View
link to the associated the filename. It will also display the
SHA1 and SHA256 fingerprint of the certificate. All certificate files can be deleted by
clicking the
Delete Certificate Files
check box.
Certificate File for
Agent
The certificate file for the EMG agent.