Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – HTTPS Certificates for specific guidance on installing certificates and enabling HTTPS.
RADIUS over TLS and LDAP over TLS are supported.
Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – RADIUS Server Authenticationfor specific guidance on configuring RADIUS over TLS.
Reference the Extreme SLX-OS Security Configuration Guide, 20.2.1 – Lightweight Directory Access Protocol for specific guidance on configuring LDAP over TLS.
 To enable
        secure logging using the syslog server, complete the following
        steps.
device# crypto import syslogca rbridge-id 1 protocol SCP host 10.2.2.101 directory
        /home/certs/ file chainCA02.cert.pem user admin password <password>
       The CA certificate imported must be generated using RSA-2048 with
          SHA-256.
device(config)# logging syslog-server 10.20.238.120 
        secure port 1999
      The device enforces certificate validation during import and TLS server certificate validation occurs during the TLS handshake according to the following rules:
basic Constraintsextension and that the CA flagis setto TRUE for all CA
          certificates.SYSLOG, the device
          currently requires that an IP address must be used for Common Name (CN) and Subject
          Alternative Name (SAN).  The extendedKeyUsage field should be validated according to the following
            rules:
(id- kp 3 with OID
            1.3.6.1.5.5.7.3.3) in the extended Key Usagefield.(id-kp 1 with OID
            1.3.6.1.5.5.7.3.1) in the extended Key Usage field.id-kp 2 with OID
            1.3.6.1.5.5.7.3.2) in the extended Key Usage field.id-kp 9 withOID
            1.3.6.1.5.5.7.3.9) in the extended Key Usage field.basic
            Constraints extensionis present and the CA flag is set to TRUE.