
1 Secure GSLB
ServerIron(config)#wr mem
.Write
..Write
ServerIron(config)#Saving SSH host keys process is ongoing. Please wait
.................................................................................
......Writing SSH host keys is done!
A write mem followed by a reload is required. Next, enter the crypto key generate rsa command on the site ServerIron ADX and reload.
Notice the public key is cleartext whereas the private key is not.
NOTE
The crypto RSA component calls the same key functions as SSH. Similar to the SSH implementation, the public and private keys for each ServerIron ADX are stored in its E2PROM. The private key cannot be seen or displayed using any CLI commands or any other user interface. Not even an administrator can gain access to the private key.
Exchanging public keys
Each ServerIron ADX must exchange public keys with each peer ServerIron ADX it needs to communicate with. This exchange allows the peers to authenticate before the GSLB communication starts.
The ServerIron ADX uses an
The public key exchange sequence is illustrated below with an example. In the example, Bob (the site ServerIron ADX) and David (the controller ServerIron ADX) are two network administrators who want to exchange the public keys. For security reasons, We recommend that both administrators be locally logged into the console ports (not telnetted in) during this procedure.
1.(Optional) Both Bob and David issue the gslb
2. Bob enables a key exchange connection with the following command.
Enter
Wait for connection from peer(enter 'y' or 'n'): y
Waiting ....
The command syntax is crypto
60 | ServerIron ADX Global Server Load Balancing Guide |
|