Reset Search
 

 

Article

HOW TO Generate a Certificate Signing Request (CSR) and Private Key for Extreme Management Center

« Go Back

Information

 
TitleHOW TO Generate a Certificate Signing Request (CSR) and Private Key for Extreme Management Center
Objective
  • To generate a Certificate Signing Request (CSR) and private key for use with Extreme Management Center.
Environment
  • Extreme Management Center (XMC, formerly NetSight)
  • All Software Releases
  • OpenSSL
  • Certificates
Procedure
The overall process requires the following:
  • Generate a private key.
  • Generate a Certificate Sign Request (CSR).
  • Submit the CSR to a PKI to be signed.
  • Import the signed certificate and private key into Extreme Management Center.

STEP 1 - Generate Server Private Key
  • Use OpenSSL to generate a PKCS#8 formatted server private key. Specify the key_size and file_name according to your preference.
  • SYNTAX: openssl genrsa <key_size> | openssl pkcs8 -v1 PBE-SHA1-RC4-128 -topk8 -out <file_name>.key
root@xmc:~$ openssl genrsa 2048 | openssl pkcs8 -v1 PBE-SHA1-RC4-128 -topk8 -out xmc_server.key
Generating RSA private key, 2048 bit long modulus
................................................................................+++++
..............+++++
e is 65537 (0x010001)
Enter Encryption Password: <your_key_password>
Verifying - Enter Encryption Password: <your_key_password>
  • NOTE: If the private key password is lost or forgotten the private key and all child certificates will be obsolete as transfer and import of the private key will fail.
  • NOTE: If the private key was previously generated using the above openssl syntax omitting -v1 format, convert the PKCS#5 v2.0 encoded key to PKCS#5 v1.5 format using the following command:
openssl pkcs8 -v1 PBE-SHA1-RC4-128 -in <original_key_file> -topk8 -out <new_key_file>

STEP 2- Create a Certificate Sign Request (CSR)
  • Use OpenSSL to generate a PEM formatted Certificate Sign Request (CSR) using the private key created in STEP 1 above.
  • SYNTAX: openssl req -new -key <key_name>.key -out <csr_name>.csr
root@xmc:~$ openssl req -new -key xmc_server.key -out xmc_server.csr
Enter pass phrase for xmc_server.key: <your_key_password>
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US 
State or Province Name (full name) [Some-State]:New Hampshire
Locality Name (eg, city) []:Salem
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Extreme Networks
Organizational Unit Name (eg, section) []:GTAC
Common Name (e.g. server FQDN or YOUR name) []:xmc.extremenetworks.com
Email Address []:support@extremenetworks.com

Please enter the following 'extra' attributes
to be sent with your certificate request
A challenge password []:<your_passphrase>
An optional company name []:Extreme Networks

STEP 3 - Submit CSR to Certificate Authority (CA) PKI For Signing
  • Submit the CSR generated in STEP 2 above to your Certificate Authority (CA) PKI for signing.

STEP 4 - Install Signed Certificate and Private Key
  1. Log Into Extreme Management Center.
  2. Select Administration -> Certificates -> Update Server Certificate.

User-added image

  1. Click "Drop files here or click to browse." Select Your KEY and signed PEM or PKCS#8 formatted certificate.
  2. Click "Use password to access the private key" and enter your private key password.
  3. Click OK.

User-added image

Additional notes
The procedure is largely the same for the Access Control or NAC appliances, with some minor changes to procedure.
How to update a certificate on a Access Control appliance (NAC) with Extreme Management Center (XMC)

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255