Northbound Interface Certificates

The certificate is bundled with EFA and signed by the private Certificate Authority (CA) Chain. So that the certificate can be replaced with a third-party certificate acquired through trusted CAs (such as Verisign or GoDaddy), the certificate must be present in the host device that is running EFA. You can then install it with the following command:
$ efa certificates server –-certificate <cert-filename> --key <key-filename> --cacert cert-filename
Important

Important

  • If you install your own server certificate to use with the EFA HTTPS server, remember to reinstall the certificate when you upgrade EFA.
  • Generate the third-party certificates and keys without a passphrase. Certificate installation may fail if you generate the third-party certificates and keys with passphrase.
Communication with third-party certificates in an EFA installation is enabled on the following ports: For information about third-party certificates in a multiple management IP network, see Configuration Supporting Multiple Management IP Networks.

For a multi-node deployment, EFA uses the common name (CN) of the virtual IP address and a Subject Alternate Name containing the virtual IP address and the node IP addresses.

Example for a single-node deployment:
Subject: CN=efa.extremenetworks.com 
         …… 
            X509v3 Subject Alternative Name:  
                DNS:efa.extremenetworks.com, IP Address:127.0.0.1, 
IP Address:10.24.15.173 
Example for a multi-node deployment:
  Subject: CN=efa.extremenetworks.com 
         …… 
            X509v3 Subject Alternative Name:
                DNS:efa.extremenetworks.com, IP Address:127.0.0.1, IP Address:10.24.15.178, 
IP Address:10.24.15.174, IP Address:10.24.15.253