Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Can we confirm the certificate and its key can work well by some command?

Posted on 2016-09-18
2
Medium Priority
?
85 Views
Last Modified: 2016-09-21
Hi After we import certificate and its key and then upgrade, do we have some commands to confirm they can work well in F5?   Thank you
0
Comment
Question by:eemoon
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 7

Accepted Solution

by:
D Patel earned 2000 total points
ID: 41804197
Impact of procedure: Performing the following procedure should not have a negative impact on your system.

Use Secure Copy protocol (SCP) to transfer the new SSL certificate and key files to the BIG-IP system.
Note: For more information about transferring files into the BIG-IP system, refer to SOL175: Transferring files to or from an F5 system.

o Install the certificate to the /config/ssl/ssl.crt/ directory

o Install the key to the /config/ssl/ssl.key/ directory

Log in to the Traffic Management Shell (tmsh) by typing the following command:
tmsh

To install the SSL certificate, use the following command syntax:
Note: To install the certificate and key files into a specific partition, run the cd /<partition> command.

install /sys crypto cert <SSL-certificate-name> from-local-file <path-to-certificate-file>

For example:

install /sys crypto cert sol14031cert from-local-file /config/ssl/ssl.crt/sol14031.crt

To install the SSL key, use the following command syntax:
install /sys crypto key <SSL-key-name> from-local-file <path-to-key-file>

For example:

install /sys crypto key sol14031key from-local-file /config/ssl/ssl.key/sol14031.key

To verify that the SSL certificate has been successfully installed into the BIG-IP system, use the following command syntax:
list /sys crypto cert <SSL-certificate-name>

For example:

list /sys crypto cert sol14031cert

Note: If you install the SSL certificate properly, you can view the output of a list of SSL certificate attributes.

To verify that the SSL key has been successfully installed into the BIG-IP system, use the following command syntax:
list /sys crypto key <SSL-key-name>

For example:
list /sys crypto key sol14031key

Note: If you install the SSL key properly, you can view the output of a list of SSL key attributes.

To save the changes, type the following command:
save /sys config

To exit the tmsh utility, type the following command:
quit

Creating a new SSL profile using the newly imported SSL certificate and key

Impact of procedure: Performing the following procedure should not have a negative impact on your system.

Log in to the tmsh utility by typing the following command:
tmsh

To create a new SSL profile, use the following command syntax:
create /ltm profile <SSL-Profile-Type> <SSL-Profile-Name> cert <SSL-Certificate-Name> key <SSL-Key-Name>

For example, to create a Client SSL profile with the name sol14031_profile, using the certificate and key imported as sol14031cert and sol14031key, you can type the following command:
create /ltm profile client-ssl sol14031_profile cert sol14031cert key sol14031key

After you create the required SSL profiles, save the change by typing the following command:
save /sys config

To exit the tmsh utility, type the following command:
quit
0
 

Author Comment

by:eemoon
ID: 41809857
Thank you so much for your reply. It is very good!!
0

Featured Post

Tech or Treat! - Giveaway

Submit an article about your scariest tech experience—and the solution—and you’ll be automatically entered to win one of 4 fantastic tech gadgets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

As a financial services provider, your business is impacted by two of the strictest federal regulations on record: the Sarbanes-Oxley Act and the Gramm-Leach-Bliley Act. Correctly implementing faxing into your organization to provide secure, real-ti…
Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

618 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question