This command sets and displays the Secure Sockets Layer (SSL) status of the CMM.
For information about how to specify a URL for file transfer, see Specifying a URL for file transfer in the Lenovo Chassis Management Module 2 Command-Line Interface Reference Guide.
If command syntax is not correctly entered, or if a command fails to run, an error message is returned. See Common errors for a list of error messages that apply to all commands or sslcfg command errors for a list of error messages that are specific to the sslcfg command.
Function | What it does | Command | Target (see paths in Command targets) |
---|---|---|---|
Display CMM SSL status | Displays the SSL status of the specified CMM. This status includes information about SSL certificates. | sslcfg | Primary CMM:
|
Set SSL (secure LDAP) state for LDAP client | Enables or disables SSL (secure LDAP) or starts
transport layer security for the LDAP client. Note:
|
sslcfg
-client state where state is enabled , disabled , or starttls . This command can only be
run by users who have one or more of the following command authorities:
|
Primary CMM:
|
Set SSL state for HTTPS server | Enables or disables the HTTPS server. Note: The HTTPS server can be enabled if a certificate is in
place.
|
sslcfg
-server state where state is enabled or disabled . This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
View internally signed certificate | Displays internally signed server certificate. | sslcfg -view intsrv | Primary CMM:
|
View self-signed certificate | Displays a certificate authority self-signed root certificate for the CMM. | sslcfg -view ca | Primary CMM:
|
Generate self-signed certificate | Generates a self-signed certificate for the chassis
certificate authority. Note:
|
sslcfg
-gen ca -csa type where the optional certificate type is:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
View externally signed server certificate | Displays externally signed certificate information for the server. | sslcfg -view extsrv | Primary CMM:
|
Import (upload) externally signed LDAP client certificate and CA bundle | Import (upload) externally signed LDAP certificate
and CA bundle for the LDAP client. The upload locations of the externally signed certificate file and CA bundle are set separately using the -u and -cabu command options. |
sslcfg
-upld -t client -u URL -cabu CA_URL where:
Note: The -t client option is
optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users
who have one or more of the following command authorities:
|
Primary CMM:
|
Delete externally signed LDAP client certificate and CA bundle | Remove an externally signed LDAP certificate and CA bundle from the LDAP client. | sslcfg -remove
-t client Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users
who have one or more of the following command authorities:
|
Primary CMM:
|
View CA bundle for externally signed server certificate | Displays certificate authority bundle information for the externally signed certificate of the server. | sslcfg -view extcab | Primary CMM:
|
Import (upload) externally signed server certificate and CA bundle | Import (upload) externally signed certificate and
CA bundle for the server. The upload locations of the externally signed certificate file and CA bundle are set separately using the -u and -cabu command options. |
sslcfg
-upld -t server -u URL -cabu CA_URL where:
This command can only be run by users who
have one or more of the following command authorities:
|
Primary CMM:
|
Reapply externally signed server certificate | Reapply an externally signed server certificate to the LDAP server. Unsuccessful certificate application lists any compute nodes that are unable to use externally signed certificates: the CMM uses a self-signed certificate for the LDAP server in this case. | sslcfg
-reapply This command can only be run
by users who have one or more of the following command authorities:
|
Primary CMM:
|
Generate self-signed certificate (for failed externally signed server certificate) | Generates a self-signed certificate for use with
an LDAP server that does not support externally signed server certificates. The CMM LDAP server receives an SSL certificate internally signed by the CMM root certificate authority (CA) certificate. The IMM in each compute node then uses the root certificate in the LDAP client to trust the CMM LDAP server. Note:
|
sslcfg
-gen ldapsrv -csa type where the optional certificate type is:
This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
View externally signed LDAP client certificate | Displays externally signed LDAP client certificate information. | sslcfg -view extclnt | |
Generate CSR | Generates a certificate signing request (CSR) for
the CMM HTTPS
server or LDAP client. The following values must be set when generating a CSR:
The following optional values can be set when generating a CSR:
|
sslcfg
-gen csr -c country -sp "state"-cl "city"-on "org"-hn hostname -cp "name"-ea email-ou "org_unit"-s "surname" -gn "given_name"-in "initial"-dq "dn_qualifier"-cpwd password-un "un_name" -t target where
the following required options are:
where the following optional options are:
(continued on next page) |
Primary CMM:
|
Generate CSR (continued) |
Note: Arguments that must be quote-delimited are shown in quotation
marks.
This command can only be run by users who have one
or more of the following command authorities:
|
||
Download CA self-signed root certificate file | Downloads the specified CA self-signed root certificate
file. The location of the CA self-signed root certificate file, including IP address of the server for downloading and filename, and must be set using the -u command option. Note: To
successfully download and import a CA certificate into an external
LDAP server trust store, make sure that secure LDAP is enabled using
the sslcfg -server enabled or the sslcfg
-client enabled command.
|
sslcfg
-dnld ca -u URL where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. This command can only be run by users who have one or more
of the following command authorities:
|
Primary CMM:
|
Download certificate or CSR file of specified format | Downloads the specified certificate file, specifying
the certificate file format. The location of the certificate or CSR file, including IP address of the server for downloading and filename, and must be set using the -u command option. Note: If
the certificate or CSR file format is not specified using the -f command
option, the format defaults to DER.
|
sslcfg
-dnld cert_type-f format-u URL -t target where:
This command can only be run by users who have
one or more of the following command authorities:
|
Primary CMM:
|
View trusted certificate 1 | Displays trusted certificate 1 information for the LDAP client. | sslcfg -tc1 view | Primary CMM:
|
View trusted certificate 2 | Displays trusted certificate 2 information for the LDAP client. | sslcfg -tc2 view | Primary CMM:
|
View trusted certificate 3 | Displays trusted certificate 3 information for the LDAP client. | sslcfg -tc3 view | Primary CMM:
|
Import (upload) trusted certificate 1 | Import (upload) trusted certificate 1 for the
LDAP client. The upload location of the trusted certificate file, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg
-tc1 import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users
who have one or more of the following command authorities:
|
Primary CMM:
|
Import (upload) trusted certificate 2 | Import (upload) trusted certificate 2 for the
LDAP client. The upload location of the trusted certificate file, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg
-tc2 import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users
who have one or more of the following command authorities:
|
Primary CMM:
|
Import (upload) trusted certificate 3 | Import (upload) trusted certificate 3 for the
LDAP client. The upload location of the trusted certificate file, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg
-tc3 import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users
who have one or more of the following command authorities:
|
Primary CMM:
|
Export (download) trusted certificate 1 | Downloads (exports) trusted certificate 1 for the
LDAP client. The location of the trusted certificate 1 file, including IP address of the server for downloading and filename, and must be set using the -u command option. |
sslcfg
-tc1 download -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who
have one or more of the following command authorities:
|
Primary CMM:
|
Export (download) trusted certificate 2 | Downloads (exports) trusted certificate 2 for the
LDAP client. The location of the trusted certificate 2 file, including IP address of the server for downloading and filename, and must be set using the -u command option. |
sslcfg
-tc2 download -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who
have one or more of the following command authorities:
|
Primary CMM:
|
Export (download) trusted certificate 3 | Downloads (exports) trusted certificate 3 for the
LDAP client. The location of the trusted certificate 3 file, including IP address of the server for downloading and filename, and must be set using the -u command option. |
sslcfg
-tc3 download -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the certificate file is located. Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who
have one or more of the following command authorities:
|
Primary CMM:
|
Remove trusted certificate 1 | Removes trusted certificate 1 from the LDAP client. | sslcfg
-tc1 remove -t client Note: The -t
client option is optional. If it is not specified, the command
defaults to the client target.
This command can only be run
by users who have one or more of the following command authorities:
|
Primary CMM:
|
Remove trusted certificate 2 | Removes trusted certificate 2 from the LDAP client. | sslcfg
-tc2 remove -t client Note: The -t
client option is optional. If it is not specified, the command
defaults to the client target.
This command can only be run
by users who have one or more of the following command authorities:
|
Primary CMM:
|
Remove trusted certificate 3 | Removes trusted certificate 3 from the LDAP client. | sslcfg
-tc3 remove -t client Note: The -t
client option is optional. If it is not specified, the command
defaults to the client target.
This command can only be run
by users who have one or more of the following command authorities:
|
Primary CMM:
|
Import (upload) certificate | Import (upload) certificate for the CMM HTTPS
server or LDAP client. The upload location of the certificate file, including IP address and filename, an must be set using the -u command option. |
sslcfg
-upld -u URL -t target where:
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
View CRL 1 | Displays certificate revocation list 1 for the LDAP client. | sslcfg -crl1 view | Primary CMM:
|
View CRL 2 | Displays certificate revocation list 2 for the LDAP client. | sslcfg -crl2 view | Primary CMM:
|
View CRL 3 | Displays certificate revocation list 3 for the LDAP client. | sslcfg -crl3 view | Primary CMM:
|
Set CRL checking state for LDAP client | Enables or disables certificate revocation list checking for the LDAP client. | sslcfg
-crl state where state is enabled or disabled . This
command can only be run by users who have one or more of the following
command authorities:
|
Primary CMM:
|
Import (upload) CRL 1 | Import (upload) certificate revocation list 1 for
the LDAP client. The upload location of the CRL, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg -crl1
import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the CRL is located. Note: The -t client option is optional. If
it is not specified, the command defaults to the client target.
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Import (upload) CRL 2 | Import (upload) certificate revocation list 2 for
the LDAP client. The upload location of the CRL, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg -crl2
import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the CRL is located. Note: The -t client option is optional. If
it is not specified, the command defaults to the client target.
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Import (upload) CRL 3 | Import (upload) certificate revocation list 3 for
the LDAP client. The upload location of the CRL, including IP address of the server and filename, an must be set using the -u command option. |
sslcfg -crl3
import -u URL -t client where URL is fully qualified uniform resource locator, including file name, of the tftp, ftp, http, https, or sftp server where the CRL is located. Note: The -t client option is optional. If
it is not specified, the command defaults to the client target.
This command can only be run by users who have one or
more of the following command authorities:
|
Primary CMM:
|
Remove CRL 1 | Removes certificate revocation list 1 from the LDAP client. | sslcfg -crl1
remove -t client Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who have one
or more of the following command authorities:
|
Primary CMM:
|
Remove CRL 2 | Removes certificate revocation list 2 from the LDAP client. | sslcfg -crl2
remove -t client Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who have one
or more of the following command authorities:
|
Primary CMM:
|
Remove CRL 3 | Removes certificate revocation list 3 from the LDAP client. | sslcfg -crl3
remove -t client Note: The -t client option
is optional. If it is not specified, the command defaults to the client
target.
This command can only be run by users who have one
or more of the following command authorities:
|
Primary CMM:
|
sslcfg
sslcfg -gen csr -c us -sp "nc" -cl "cary" -on "lenovo" -hn hostname -t server
The following example shows the information that is returned from these commands:
system:mm[1]> sslcfg -server enabled -client disabled Certificate Authority certificate status: A Root certificate is installed (rsa2048sha1) SSL Server Certificate status: A self-signed certificate is installed SSL Client Certificate status: No certificate has been generated SSL Client Trusted Certificate status: Trusted Certificate 1: Not available Trusted Certificate 2: Not available Trusted Certificate 3: Not available SSL Client CRL status: CRL 1: Not available CRL 2: Not available CRL 3: Not available -crl disabled system:mm[1]> system:mm[1]> sslcfg -gen csr -c us -sp "nc" -cl "cary" -on "lenovo" -hn hostname -t server Certificate Signing Request (CSR) is ready for downloading. To get the CSR, use the download CSR command. You can then send it to a CA for signing. OK system:mm[1]>