Cisco Systems OL-5742-01 manual Exporting an SSL Certificate, 18-34

Page 34

Chapter 18 Configuring SGM Security

Implementing SSL Support in SGM

 

Use the Open dialog to locate the SSL certificate that you want to import. The

 

Open dialog for an SSL certificate provides the following fields and buttons:

 

 

 

Field or Button

 

Description

 

 

 

Look In

 

Enables you to select the directory in which you want to find the SSL

 

 

certificate. Either accept the default directory, or select a new directory from

 

 

the drop-down list box.

 

 

For a self-signed certificate, locate the directory in which you downloaded the

 

 

certificate.

 

 

 

File Name

 

Enter a name for the SSL certificate, or select a file from those listed in the

 

 

Open field. SGM displays the name of the certificate in the File Name field.

 

 

 

Files of Type

 

Specifies the type of file to display, and displays all files of that type in the

 

 

selected directory. For SSL certificates, this field displays All files, which

 

 

means files of all types are displayed in the table.

 

 

 

Up One Level

 

Displays the sub-folders and files that are in the folder that is up one level from

 

 

the currently displayed folder.

 

 

 

Desktop

 

Displays the sub-folders and files that are on your workstation desktop.

 

 

 

Create New Folder

 

Creates a new sub-folder in the displayed folder.

 

 

 

List

 

Displays only icons for sub-folders and files.

 

 

 

Details

 

Displays detailed information for sub-folders and files, including their size,

 

 

type, date they were last modified, and so on.

 

 

 

Open

 

Imports the file, closes the Open dialog for an SSL certificate, and populates

 

 

the SGM Certificate Tool dialog with the SSL certificate’s information.

 

 

 

Cancel

 

Closes the Open dialog for an SSL certificate without importing the file.

 

 

 

Related Topics:

Launching the SGM Certificate Tool for SSL, page 18-31

Exporting an SSL Certificate

If you have implemented Secure Sockets Layer (SSL) support in your SGM system, you can export SSL certificates that have been imported to the SGM client.

 

Cisco Signaling Gateway Manager User Guide

18-34

OL-5742-01

Image 34
Contents Configuring SGM Security 18-1# cd /opt/CSCOsgm/bin # ./sgm useraccess enable Implementing SGM User-Based Access Solaris Only18-2 # ./sgm authtype local Sgm disablepass Sgm passwordage Sgm userpassSgm adduser Sgm disableuser Sgm enableuser Sgm updateuser 18-3# ./sgm sgm adduser username # ./sgm authtype solaris18-4 Creating Secure Passwords 18-5DICTFILE=/dev/null 18-6Basic User Level 1 Access 18-7Power User Level 2 Access 18-8Network Administrator Level 4 Access 18-9Automatically Disabling Users and Passwords Solaris Only 18-1018-11 # ./sgm inactiveuserdays clear # ./sgm passwordage number-of-days# ./sgm inactiveuserdays number-of-days 18-12# ./sgm clitimeout clear # ./sgm passwordage clear# ./sgm clitimeout number-of-minutes 18-13# ./sgm deluser username Manually Disabling Users and Passwords Solaris Only# ./sgm disablepass username 18-14# ./sgm disableuser username 18-15# ./sgm userpass username # ./sgm enableuser username18-16 # ./sgm updateuser username 18-17# ./sgm newlevel username Displaying a Message of the Day18-18 18-19 # ./sgm motd edit # cd /opt/CSCOsgm/bin # ./sgm motd enableDecline 18-20Listing All Currently Defined Users Manually Synchronizing Local SGM Passwords18-21 Displaying the Contents of the System Security Log # ./sgm seclog clear # cd /opt/CSCOsgm/bin # ./sgm restore securityRestoring Security-Related SGM Data 18-23Specifying a Super User Solaris Only Disabling SGM User-Bases Access18-24 18-25 Sgm webport Sgm xtermpath 18-26Enabling SSL Support in SGM 18-27# ./sgm keytool importcert certfilename 18-28# ./sgm keytool importkey keyfilename certfilename 18-29Right-clickDownload SGM Server SSL Certificate 18-30# cd /opt/CSCOsgm/bin # ./sgm certgui Launching the SGM Certificate Tool for SSL18-31 18-32 Exit Importing an SSL Certificate to an SGM ClientDetails HelpExporting an SSL Certificate 18-34Save 18-35Viewing Detailed Information About an SSL Certificate 18-3618-37 Certificate Information Dialog18-38 Disabling SSL Support in SGM Managing SSL Support in SGM18-39 Limiting SGM Client Access to the SGM Server Solaris Only 18-40# ./sgm ipaccess edit # ./sgm ipaccess add18-41 18-42
Related manuals
Manual 136 pages 55.23 Kb

OL-5742-01 specifications

Cisco Systems OL-5742-01 represents an essential advancement in the field of network infrastructure, tailored for organizations that demand robust, reliable, and scalable solutions. As part of Cisco's offerings, this device stands out for its comprehensive features and the technologies embedded within its design.

One of the main features of the OL-5742-01 is its support for advanced routing protocols. The device is engineered to handle both static and dynamic routing, making it versatile for different networking environments. This flexibility allows organizations to efficiently manage data traffic, ensuring optimal performance and minimal downtime. In addition, its built-in redundancy mechanisms ensure that network operations remain uninterrupted, offering peace of mind for mission-critical applications.

The OL-5742-01 is also designed with a focus on security. It incorporates a variety of security features, including advanced encryption protocols, firewall capabilities, and intrusion detection systems. This multilayered approach helps safeguard sensitive data from a myriad of cyber threats, which is particularly crucial in today's digital landscape where data breaches and cyberattacks are prevalent.

Furthermore, the device supports a range of connectivity options, making it suitable for various deployment scenarios. With multiple Ethernet ports and options for fiber connections, it adapts to the specific requirements of an organization's infrastructure. Its ability to support both wired and wireless connections enhances flexibility, allowing for seamless integration into existing networks.

Another noteworthy characteristic of the OL-5742-01 is its scalability. Organizations can easily upgrade their network infrastructure by adding additional units or expanding current capacity without overhauling their entire system. This feature is invaluable for businesses anticipating growth, as it aligns with their evolving needs.

The management of the OL-5742-01 is streamlined through its user-friendly interface, which allows network administrators to monitor and manage the device efficiently. Advanced diagnostic tools assist in troubleshooting, enabling rapid identification and resolution of issues, thus reducing potential network downtime.

In conclusion, Cisco Systems OL-5742-01 is a powerful networking device that encapsulates security, scalability, and advanced routing capabilities. Its features and technologies cater effectively to the demands of contemporary organizations, making it a reliable choice for building and maintaining resilient network infrastructures.