Lantronix EMG 8500 EMG User Guide - Page 166

Tools -> Internet Options, Internet Explorer

Page 166 highlights

8: Services When an EMG is configured with a SSL certificate that is either a wildcard certificate or associated with a specific name, in order to establish a Web SSH or Web Telnet session to the EMG unit, the unit must be able to successfully perform a reverse lookup on any IP address to which Web SSH or Web Telnet requests are sent. For example, if a unit is configured with a SSL certificate for the name "EMGXYZ.lantronix.com", and the unit website is being accessed in a browser with "https:// EMGXYZ.lantronix.com", the unit needs to be configured with a name server that will allow the unit to perform a reverse lookup on the IP address associated with EMGXYZ.lantronix.com. Failure to perform a reverse lookup on a name may result in name mismatch errors in the browser when it attempts to open the Web SSH or Web Telnet window. If you are unable to connect to a Web SSH or Web Telnet session for a reason other than a browser SSL certificate issue, restarting the SSL server on port 8000 may resolve the connection problem. This can be done by restarting the web server (with the CLI command admin web restart) or by disabling both Web SSH and Web Telnet on the SSH/Telnet/Logging web page, and then re-enabling them.  Chrome - For the greatest ease of use with Web SSH and Web Telnet, when the EMG web server is using a self-signed SSL certificate, use the Chrome browser. When the user accepts the self-signed SSL certificate in the browser for the primary EMG website, the self-signed SSL certificate is accepted for all ports - including port 8000 - for the EMG website.  Firefox - When accessing the EMG website with Firefox, and when the EMG web server is using a self-signed SSL certificate, accepting the self-signed SSL certificate in the browser for the primary EMG website will only accept the certificate for port 443. It will not accept the certificate for port 8000. This may result in a popup being displayed in the Web SSH or Web Telnet window indicating that the browser needs to accept a certificate. To accept the selfsigned certificate for port 8000, go to Firefox -> Options (or Preferences) -> Advanced -> Certificates -> View Certificates -> Servers, and add an exception for the EMG IP address or hostname, with port 8000.  Internet Explorer - When accessing the EMG website with Internet Explorer, and when the EMG web server is using a self-signed SSL certificate, Explorer will grant access to the Web SSH and Web Telnet terminals if (a) the host name or common name in the self-signed certificate matches the name (or IP address) being used to access the EMG website, and (b) Explorer has imported and trusted the self-signed certficate. A custom self-signed certificate with the EMG name can be generated via the Web Server - SSL Certificate web page or the admin web certificate custom CLI command. Once the EMG web server has been configured to use the custom self-signed certificate, follow these steps for Internet Explorer to trust the custom certificate:  In Internet Explorer, browse to the EMG website whose certificate you want to trust.  When you see the message "There is a problem with this website's security certificate.", choose Continue to this website (not recommended).  In Internet Explorer, select Tools -> Internet Options.  Select Security -> Trusted Sites -> Sites.  Verify or fill in the EMG website URL in the Add this website field, click Add, and then Close.  Close the Internet Options dialog with either OK or Cancel.  Refresh the Internet Explorer web page with the EMG website.  When you see the message "There is a problem with this website's security certificate", choose Continue to this website (not recommended).  Click on the red Certificate Error at the right of the URL address bar and select View certificates. EMG™ Edge Management Gateway User Guide 166

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

8: Services
EMG™ Edge Management Gateway User Guide
166
When an EMG is configured with a SSL certificate that is either a wildcard certificate or associated
with a specific name, in order to establish a Web SSH or Web Telnet session to the EMG unit, the
unit must be able to successfully perform a reverse lookup on any IP address to which Web SSH
or Web Telnet requests are sent. For example, if a unit is configured with a SSL certificate for the
name "EMGXYZ.lantronix.com", and the unit website is being accessed in a browser with "https://
EMGXYZ.lantronix.com", the unit needs to be configured with a name server that will allow the unit
to perform a reverse lookup on the IP address associated with EMGXYZ.lantronix.com. Failure to
perform a reverse lookup on a name may result in name mismatch errors in the browser when it
attempts to open the Web SSH or Web Telnet window.
If you are unable to connect to a Web SSH or Web Telnet session for a reason other than a
browser SSL certificate issue, restarting the SSL server on port 8000 may resolve the connection
problem. This can be done by restarting the web server (with the CLI command
admin web
restart
) or by disabling both Web SSH and Web Telnet on the
SSH/Telnet/Logging
web page,
and then re-enabling them.
Chrome
- For the greatest ease of use with Web SSH and Web Telnet, when the EMG web
server is using a self-signed SSL certificate, use the Chrome browser. When the user accepts
the self-signed SSL certificate in the browser for the primary EMG website, the self-signed
SSL certificate is accepted for all ports - including port 8000 - for the EMG website.
Firefox
- When accessing the EMG website with Firefox, and when the EMG web server is
using a self-signed SSL certificate, accepting the self-signed SSL certificate in the browser for
the primary EMG website will only accept the certificate for port 443. It will not accept the
certificate for port 8000. This may result in a popup being displayed in the Web SSH or Web
Telnet window indicating that the browser needs to accept a certificate. To accept the self-
signed certificate for port 8000, go to Firefox -> Options (or Preferences) -> Advanced ->
Certificates -> View Certificates -> Servers, and add an exception for the EMG IP address or
hostname, with port 8000.
Internet Explorer
- When accessing the EMG website with Internet Explorer, and when the
EMG web server is using a self-signed SSL certificate, Explorer will grant access to the Web
SSH and Web Telnet terminals if (a) the host name or common name in the self-signed
certificate matches the name (or IP address) being used to access the EMG website, and (b)
Explorer has imported and trusted the self-signed certficate. A custom self-signed certificate
with the EMG name can be generated via the
Web Server - SSL Certificate
web page or the
admin web certificate custom CLI command.
Once the EMG web server has been configured to use the custom self-signed certificate, follow
these steps for Internet Explorer to trust the custom certificate:
In Internet Explorer, browse to the EMG website whose certificate you want to trust.
When you see the message "There is a problem with this website's security certificate.",
choose
Continue to this website (not recommended)
.
In Internet Explorer, select
Tools -> Internet Options
.
Select
Security -> Trusted Sites -> Sites
.
Verify or fill in the EMG website URL in the
Add this website
field, click
Add
, and then
Close
.
Close the I
nternet Options
dialog with either
OK
or
Cancel
.
Refresh the Internet Explorer web page with the EMG website.
When you see the message "There is a problem with this website's security certificate",
choose
Continue to this website (not recommended)
.
Click on the red
Certificate Error
at the right of the URL address bar and select
View
certificates
.