Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – HTTPS Certificates for specific guidance on installing certificates and enabling HTTPS.
RADIUS over TLS and LDAP over TLS are supported.
Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – RADIUS Server Authenticationfor specific guidance on configuring RADIUS over TLS.
Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – Lightweight Directory Access Protocol for specific guidance on configuring LDAP over TLS.
To enable
secure logging using the syslog
server, complete the following
steps.
device# crypto import syslogca rbridge-id 1 protocol SCP host 10.2.2.101 directory /home/certs/ file chainCA02.cert.pem user admin password <password>
The CA certificate imported must be generated using RSA-2048
with
SHA-256
.
device(config)# logging syslog-server 10.20.238.120 secure port 1999
The device enforces certificate validation during import and TLS server certificate validation occurs during the TLS handshake according to the following rules:
basic Constraints
extension and that the CA flagis setto TRUE for all CA
certificates.SYSLOG
, the device
currently requires that an IP address must be used for Common Name (CN) and Subject
Alternative Name (SAN). The extendedKeyUsage
field should be validated according to the following
rules:
(id- kp 3 with OID
1.3.6.1.5.5.7.3.3
) in the extended Key Usage
field.(id-kp 1 with OID
1.3.6.1.5.5.7.3.1
) in the extended Key Usage
field.id-kp 2 with OID
1.3.6.1.5.5.7.3.2
) in the extended Key Usage
field.id-kp 9 withOID
1.3.6.1.5.5.7.3.9
) in the extended Key Usage
field.basic
Constraints
extensionis present and the CA flag is set to TRUE.