[Webinar] Streamline your web hosting managementRegister Today

x
?
Solved

Can we confirm the certificate and its key can work well by some command?

Posted on 2016-09-18
2
Medium Priority
?
94 Views
Last Modified: 2016-09-21
Hi After we import certificate and its key and then upgrade, do we have some commands to confirm they can work well in F5?   Thank you
0
Comment
Question by:eemoon
2 Comments
 
LVL 7

Accepted Solution

by:
D Patel earned 2000 total points
ID: 41804197
Impact of procedure: Performing the following procedure should not have a negative impact on your system.

Use Secure Copy protocol (SCP) to transfer the new SSL certificate and key files to the BIG-IP system.
Note: For more information about transferring files into the BIG-IP system, refer to SOL175: Transferring files to or from an F5 system.

o Install the certificate to the /config/ssl/ssl.crt/ directory

o Install the key to the /config/ssl/ssl.key/ directory

Log in to the Traffic Management Shell (tmsh) by typing the following command:
tmsh

To install the SSL certificate, use the following command syntax:
Note: To install the certificate and key files into a specific partition, run the cd /<partition> command.

install /sys crypto cert <SSL-certificate-name> from-local-file <path-to-certificate-file>

For example:

install /sys crypto cert sol14031cert from-local-file /config/ssl/ssl.crt/sol14031.crt

To install the SSL key, use the following command syntax:
install /sys crypto key <SSL-key-name> from-local-file <path-to-key-file>

For example:

install /sys crypto key sol14031key from-local-file /config/ssl/ssl.key/sol14031.key

To verify that the SSL certificate has been successfully installed into the BIG-IP system, use the following command syntax:
list /sys crypto cert <SSL-certificate-name>

For example:

list /sys crypto cert sol14031cert

Note: If you install the SSL certificate properly, you can view the output of a list of SSL certificate attributes.

To verify that the SSL key has been successfully installed into the BIG-IP system, use the following command syntax:
list /sys crypto key <SSL-key-name>

For example:
list /sys crypto key sol14031key

Note: If you install the SSL key properly, you can view the output of a list of SSL key attributes.

To save the changes, type the following command:
save /sys config

To exit the tmsh utility, type the following command:
quit

Creating a new SSL profile using the newly imported SSL certificate and key

Impact of procedure: Performing the following procedure should not have a negative impact on your system.

Log in to the tmsh utility by typing the following command:
tmsh

To create a new SSL profile, use the following command syntax:
create /ltm profile <SSL-Profile-Type> <SSL-Profile-Name> cert <SSL-Certificate-Name> key <SSL-Key-Name>

For example, to create a Client SSL profile with the name sol14031_profile, using the certificate and key imported as sol14031cert and sol14031key, you can type the following command:
create /ltm profile client-ssl sol14031_profile cert sol14031cert key sol14031key

After you create the required SSL profiles, save the change by typing the following command:
save /sys config

To exit the tmsh utility, type the following command:
quit
0
 

Author Comment

by:eemoon
ID: 41809857
Thank you so much for your reply. It is very good!!
0

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware is a growing menace to anyone using a computer or mobile device. Here are answers to some common questions about this vicious new form of malware.
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

612 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question