Connectrix Brocade B-Series: How to enable HTTPS web tools UI access on Brocade switches with self-signed certificates in Fabric OS 8.0.x and lower.
Summary: How to enable HTTPS web tools UI access on Brocade switches with self-signed certificates in Fabric OS 8.0.x and lower.
Symptoms
HTTPS access on web tools UI can only be activated with a correct certificate.
Instead of getting an official certificate from Certificate Authority (CA) or other companies, you can create a self-signed certificate for internal usage.
There are two issues with higher code.
1. There is a defect, as described in the article which prevents the use of the export and import function in Fabric OS 8.1.x.
2. In 8.2.x code, the command secertutil is being deprecated and replaced using the command seccertmgmt. On how to set https in switches with fabric OS 8.1.x and higher see article:
Connectrix Brocade B-Series: How to enable HTTPS web tools UI access on Brocade switches with self-signed certificates in Fabric OS 8.1.x and above.
To keep it simple, use secertutil with FOS 8.0.x and below and secertmgmt in Fabric OS 8.1.2x and above.
For explanation of secertmgmt in Fabric OS 8.1.x and above see article:
"How to enable HTTPS web tools UI access on Brocade switches with self-signed certificates in Fabric OS 8.1.x and above."
Cause
Resolution
b. We can use a third-party OpenSSL program installed on Windows, example OpenSSL light, version 1.0.2 32 bit from Shining Light Productions.
c. Generate the private key by logging into the switch as root and using the in-built OpenSSL binary.
In this example, we use the easiest solution and generate the key on the switch which needs root user access.
Both files are located in directory: /etc/fabos/certs/sw0
This needs ROOT user access, CAUTION is advised, and wrong use of the root user access may render the switch unusable.
The full example:
1. Log in the switch as root user and change the directory:
switch_55:FID55:root>
Changed directory to /etc/fabos/certs/sw0 :
switch_55:FID55:root>
switch_55:FID55:root> cd /etc/fabos/certs/sw0
2. Check if you are in the correct directory:
switch_55:FID55:root> pwd
/etc/fabos/certs/sw0
switch_55:FID55:root>
3. Check if there is anything in the directory:
switch_55:FID55:root> ls
switch_55:FID55:root>
If there are, for example old CSR and pen files, they can be removed, if needed, with the rm <filename> command.
4. Generate the public-private key pair in interactive mode:
switch_55:FID55:root>
switch_55:FID55:root> seccertutil genkey
Generating a new key pair automatically does the following:
1. Delete all existing CSR files.
2. Delete all existing certificates.
3. Reset the certificate filename to none.
4. Disable secure protocols.
Continue (yes, y, no, n): [no] y
Select key size [1024 or 2048]: 2048
Generating new rsa public/private key pair
Done.
switch_55:FID55:root>
5. Check if there is anything in the directory:
switch_55:FID55:root>
switch_55:FID55:root> ls
pvt_key
switch_55:FID55:root>
6. Generate the CSR file in interactive mode:
switch_55:FID55:root>
switch_55:FID55:root> seccertutil gencsr
Input hash type (sha1 or sha256): sha1
Country Name (2 letter code, eg, US):US
State or Province Name (full name, eg, California):California
Locality Name (eg, city name):San Jose
Organization Name (eg, company name):Brocade
Organizational Unit Name (eg, department name):IT
Common Name (Fully qualified Domain Name, or IP address):192.yyy.zz.xx1 (IP address of the switch)
Generating CSR, file name is: CSR_filename.csr
Done.
switch_55:FID55:root>
7. Check if the file is created and in the directory:
switch_55:FID55:root>
switch_55:FID55:root> ls
CSR_filename.csr pvt_key
switch_55:FID55:root>
8. Open openssl shell:
switch_55:FID55:root>
switch_55:FID55:root> openssl
OpenSSL>
9. Generate the self-signed key and the PEM:
OpenSSL> x509 -req -days 999 -sha1 -in /etc/fabos/certs/sw0/CSR_filename.csr -signkey /etc/fabos/certs/sw0/pvt_key -out /tmp/pem_filename.pem
Signature ok
subject=/C=US/ST=California/L=San Jose/O=Brocade/OU=IT/CN=192.yyy.zz.xx1
Getting Private key
OpenSSL>
## This creates the file in the "
/tmp" directory on the switch.
## The
x509 command might have different arguments in different versions of FOS, but the principal is the same.
10. Type exit to get out of the openssl shell.
OpenSSL>
OpenSSL> exit
switch_55:FID55:root>
11. To check if the file is in the /tmp directory;
switch_55:FID55:root>
switch_55:FID55:root> pwd
/etc/fabos/certs/sw0
switch_55:FID55:root>
switch_55:FID55:root> ls /tmp | grep pem
.__condbmm.0 pem_filename.pem
switch_55:FID55:root>
12. Import the PEM file with Secure Copy Protocol (SCP) from the tmp directory and enable HTTPS.
switch_55:FID55:root>
switch_55:FID55:root> seccertutil import -config swcert -enable https
Select protocol [ftp or scp]: scp
Enter IP address: localhost
Enter remote directory: /tmp
Enter certificate name (must have ".crt" or ".cer" ".pem" or ".psk" suffix):pem_filename.pem
Enter Login Name: root
root@localhost's password:
Success: imported certificate [192.yyy.zz.xx2.pem].
Certificate file in configuration has been updated.
Secure http has been enabled.
switch_55:FID55:root>
Test the HTTPS connection to the switch with Internet Explorer.
Additional Information
Connectrix Brocade B-Series: How to Enable HTTPS Webtools GUI Access on Brocade Switches
Duration: 00:07:08 (hh:mm:ss)
When available, closed caption (subtitles) language settings can be chosen using the CC icon on this video player.