Users Guide

Table Of Contents
Request and install host certificates.
When you replace the default certificate-key pair for cluster applications, ensure that all devices in the cluster use the same custom
certificate-key pair or a unique certificate-key pair issued by the same CA.
CAUTION: While you replace the default certificate-key pair, cluster devices temporarily lose their secure channel
connectivity. Dell EMC Networking recommends that you change the cluster security configuration during a
maintenance time.
This example shows how to install an X.509v3 CA and host certificate-key pair for a cluster application. For more information, see:
Importing and installing a CA certificate — see Manage CA certificates.
Generating a CSR and installing a host certificate — see Request and install host certificates.
1. Install a trusted CA certificate.
OS10# copy tftp://CAadmin:secret@172.11.222.1/GeoTrust_Universal_CA.crt
home:// GeoTrust_Universal_CA.crt
OS10# crypto ca-cert install home://GeoTrust_Universal_CA.crt
Processing certificate ...
Installed Root CA certificate
CommonName = GeoTrust Universal CA
IssuerName = GeoTrust Universal CA
2. Generate a CSR, copy the CSR to a CA server, download the signed certificate, and install the host certificate.
OS10# crypto cert generate request cert-file home://s4048-001.csr key-file home://tsr6.key
cname "Top of Rack 6" altname "IP:10.0.0.6 DNS:tor6.dell.com" email admin@dell.com
organization "Dell EMC" orgunit Networking locality "Santa Clara" state California country US
length 1024
Processing certificate ...
Successfully created CSR file /home/admin/tor6.csr and key
OS10# copy home://tor6.csr scp://CAadmin:secret@172.11.222.1/s4048-001-csr.pem
OS10# copy scp://CAadmin:secret@172.11.222.1/s4048-001.crt usb://s4048-001.crt
OS10# crypto cert install crt-file usb://s4048-001.crt key-file usb://s4048-001.key
This will replace the already installed host certificate.
Do you want to proceed ? [yes/no(default)]:yes
Processing certificate ...
Host certificate installed successfully.
3. Configure an X.509v3 security profile.
OS10# show crypto cert
-------------------------------------
| Installed non-FIPS certificates |
-------------------------------------
s4048-001
-------------------------------------
| Installed FIPS certificates |
-------------------------------------
OS10# config terminal
OS10(config)# crypto security-profile secure-cluster
OS10(config-sec-profile)# certificate s4048-001
OS10(config-sec-profile)# exit
4. Configure the cluster security profile
OS10(config)# cluster security-profile secure-cluster
OS10(config)# exit
Security
975