Lantronix EMG 8500 EMG User Guide - Page 337

Creating a Certificate, Maintenance, EMG™ Edge Management Gateway User Guide

Page 337 highlights

15: Maintenance b. Option TFTP Server IP/150 and Boot Filename/67 - if both of these are received, they will be used, and all other DHCP options will be ignored. c. Option TFTP Server IP or Name/66 and Boot Filename/67 - if both of these are received, they will be used. Any configuration file specified by VSI/43 or Boot Filename/67 must be a valid console manager configuration filename ending in "-slccfg.tgz" (for SLC8000 console managers) or "-emgcfg.tgz" (for EMG console managers). For TFTP Server IP/150, the first IP address in the IP address list will be used; all other IP addresses will be ignored.  VSI/43 suboption 1 format: the format of this suboption is a string consisting of tokens separated by spaces. Two tokens are supported: a URL indicating where to download the ZTP configuration file from, and the optional validatecert token. The URL can use the HTTPS, HTTP, FTP or TFTP protocol. The validatecert token indicates that the HTTPS protocol will be used and that a client side X.509 certificate and certificate authority files will be provided on an external USB drive or SD card; if the certificate files cannot be located, ZTP will terminate and not attempt to location a ZTP file with any other methods. The preserve_ethname token indicates that the current Eth1, Eth2, and hostname settings on EMG should be preserved and not over-written with the Eth1, Eth2 and hostname settings from the configuration being restored. Examples of suboption 1 strings are "ftp:// ftpuser:[email protected]/ztp2-slccfg.tgz" and "https://10.0.1.131/config/ ztp2-emgcfg.tgz validatecert". For validatecert, 3 certificate files are required to be in the top level directory of an external storage device: cacert.pem (certificate authority file for validating the HTTPS server), cert.pem (client side certificate file), and key.pem (client side key file). The console manager will search external storage devices in this order: upper USB port, lower USB port (if present) and SD card. The first external storage device that is found and successfully mounted is expected to be the source for the certificate files; if they are not located in the top level directory, ZTP will terminate and not attempt to locate a ZTP file with any other methods. See Creating a Certificate on page 337 for instructions to create a self-signed certificate with OpenSSL.  If the console manager is able to download the configuration file, it will restore the configuration onto the console manager, and begin the normal startup process.  If any of these steps fail for the Eth1 network port, it will repeat the process of trying to acquire a configuration over the Eth2 network port.  After attempting to acquire a configuration over the Eth2 network port, the unit will begin the normal startup process. Any results of attempting to acquire and restore a configuration file will be output to the console port and the system log. Configurations for firmware versions that are newer than the firmware version running on the unit will not be restored. Spaces are not supported in either the directory or filename portion of the Boot Filename path. Creating a Certificate To use OpenSSL to create a self signed root certificate authority, and use it to sign a client certificate that is used on the console manager and a server certificate that is installed in a web server responding to ZTP requests: 1. Setup OpenSSL environment: create a directory to store the OpenSSL configuration and certificate files. This step can be omitted if an existing OpenSSL configuration and directory will be used. a. Create a new directory and copy existing openssl.cnf file (or create openssl.cnf): EMG™ Edge Management Gateway User Guide 337

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495

15: Maintenance
EMG™ Edge Management Gateway User Guide
337
b.
Option
TFTP Server IP/150
and
Boot Filename/67
- if both of these are received, they
will be used, and all other DHCP options will be ignored.
c.
Option
TFTP Server IP or Name/66
and
Boot Filename/67
- if both of these are received,
they will be used.
Any configuration file specified by VSI/43 or Boot Filename/67 must be a valid console
manager configuration filename ending in "-slccfg.tgz" (for SLC8000 console managers) or
"-emgcfg.tgz" (for EMG console managers). For TFTP Server IP/150, the first IP address in
the IP address list will be used; all other IP addresses will be ignored.
VSI/43 suboption 1 format
: the format of this suboption is a string consisting of tokens
separated by spaces. Two tokens are supported: a URL indicating where to download the ZTP
configuration file from, and the optional
validatecert
token. The URL can use the HTTPS,
HTTP, FTP or TFTP protocol. The
validatecert
token indicates that the HTTPS protocol will
be used and that a client side X.509 certificate and certificate authority files will be provided on
an external USB drive or SD card; if the certificate files cannot be located, ZTP will terminate
and not attempt to location a ZTP file with any other methods. The
preserve_ethname
token
indicates that the current Eth1, Eth2, and hostname settings on EMG should be preserved and
not over-written with the Eth1, Eth2 and hostname settings from the configuration being
restored. Examples of suboption 1 strings are "ftp://
ftpuser:[email protected]/ztp2-slccfg.tgz" and "https://10.0.1.131/config/
ztp2-emgcfg.tgz validatecert".
For
validatecert
, 3 certificate files are required to be in the top level directory of an external
storage device:
cacert.pem
(certificate authority file for validating the HTTPS server),
cert.pem
(client side certificate file), and
key.pem
(client side key file). The console manager
will search external storage devices in this order: upper USB port, lower USB port (if present)
and SD card. The first external storage device that is found and successfully mounted is
expected to be the source for the certificate files; if they are not located in the top level
directory, ZTP will terminate and not attempt to locate a ZTP file with any other methods. See
Creating a Certificate on page 337
for instructions to create a self-signed certificate with
OpenSSL.
If the console manager is able to download the configuration file, it will restore the
configuration onto the console manager, and begin the normal startup process.
If any of these steps fail for the Eth1 network port, it will repeat the process of trying to acquire
a configuration over the Eth2 network port.
After attempting to acquire a configuration over the Eth2 network port, the unit will begin the
normal startup process.
Any results of attempting to acquire and restore a configuration file will be output to the console
port and the system log. Configurations for firmware versions that are newer than the firmware
version running on the unit will not be restored. Spaces are not supported in either the directory or
filename portion of the Boot Filename path.
Creating a Certificate
To use OpenSSL to create a self signed root certificate authority, and use it to sign a client
certificate that is used on the console manager and a server certificate that is installed in a web
server responding to ZTP requests:
1.
Setup OpenSSL environment: create a directory to store the OpenSSL configuration and
certificate files. This step can be omitted if an existing OpenSSL configuration and directory
will be used.
a.
Create a new directory and copy existing openssl.cnf file (or create openssl.cnf):