Permits downloading of certificate file(s) from files stored on a TFTP server.
ipaddress | Specifies the IP address of the TFTP server. |
ssl-cert | Specifies SSL/TLS certificate (default). |
trusted-ca |
Specifies CA certificates. |
ocsp-signature-ca |
Specifies signature CA files. |
file_name | Specifies the name of the certificate file. |
csr-cert | Specifies an SSL/TLS certificate signed through a Certificate Signing Request (CSR) generated by the switch. Trust chain verification is performed during download. |
ocsp | Specifies using or not using Online Certificate Status Protocol (OCSP) for certificate checking. |
on | Enables OCSP for SSL/TLS certificate signed through CSR generated by switch. |
off | Disables OCSP for SSL/TLS certificate signed through CSR generated by switch (off). |
If no option is selected, SSL/TLS certificate (ssl-cert) is the default.
By default, OCSP is disabled.
If the download operation is successful, any existing certificate is overwritten. For SSL/TLS certificates, after a successful download, the software attempts to match the public key in the certificate against the private key stored. If the private and public keys do not match, the switch displays a warning message similar to the following: Warning: The Private Key does not match with the Public Key in the certificate. This warning acts as a reminder to also download the private key.
Note
You can only download a certificate key in the VR-Mgmt virtual router.Downloaded certificates and keys are not saved across switch reboots unless you save your current switch configuration. After you issue the save command, the downloaded certificate is stored in the configuration file and the private key is stored in the EEPROM.
You can purchase and obtain SSL certificates from Internet security vendors.
This section provides information about the characters supported by the switch for remote IP addresses.
When configuring an IP address for your network server, remember the requirements listed above.
This section provides information about the characters supported by the switch for remote file names.
When naming a remote file, remember the requirements listed above.
# download ssl 123.45.6.78 certificate g0ethner1
# download ssl 10.120.89.79 certificate trusted-ca cacert.pem
# download ssl 10.120.89.79 certificate ocsp-signature-ca oscrcert.pem
This command was first available in the ExtremeXOS 11.2 and supported with the SSH module.
The trusted-ca and ocsp-signature-ca options were added in ExtremeXOS 22.1.
The csr-cert and ocsp were added in ExtremeXOS 31.2.
This command is available on all Universal switches supported in this document.