NetWorker: CSR-generering til SSL med "Subject Alternative Name" SAN

Summary: Denne artikel indeholder generelle instruktioner om, hvordan du genererer en anmodning om certifikatsignering (CSR) til SSL, som omfattede SAN (Subject Alternative Names). Denne vidensbase er beregnet til at yde yderligere support, men systemadministratoren skal udføre denne opgave. ...

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

Bemærk: Denne proces bruger OpenSSL-værktøjet. Som standard inkluderer Windows-værter ikke OpenSSL-programmet. Hvis det ikke er muligt at installere OpenSSL på Windows NetWorker-serveren, kan CSR udføres på enhver Linux-vært. På Linux er OpenSSL tilgængelig som standard. Bevar det genererede .csr og .key filer til validering under SSL-integration på NetWorker-serveren.

Anmodning om generering af CSR med primært Common Name (CN) og Subject Alternative Names (Angiv alle domænenavne og IP-adresser). 
  1. Opret en fil på enhver Linux-vært.
vi server_cert.cnf
  1. Indsæt nedenstående indhold i server_cert.cnf fil.
[req]
distinguished_name = req_distinguished_name
req_extensions = req_ext
prompt = no

[req_distinguished_name]
C   = 
ST  = 
L   = 
O   = 
OU  = 
CN  = 

[req_ext]
subjectAltName = @alt_names

[alt_names]
DNS.1 = 
DNS.2 = 
DNS.3 =
IP.1 =
IP.2 =
email.1 = 
  1. Når ovenstående skabelon er oprettet, skal du angive de miljøspecifikke oplysninger. Kontakt din domæneadministrator, hvis der er behov for hjælp til at generere CSR. 
Country (C): The two-letter ISO code(* see link below)  for the country where the organization is located.

State/County/Region (ST): The state/region where the organization is located.

Locality (L): The city where the organization is located.

Organization Name (O): Usually the legal name of a company or entity and should include any suffixes such as Ltd., Inc., or Corp.
Organizational Unit (OU): Internal organization department/division name.

Common Name (CN): The fully or qualified domain name (FQDN) of the server based on the hostname available on the nsrla of the host.

Clarified SAN Guidance : It is important to include the FQDN as DNS.1. Add the short hostname and any other aliases or IP addresses as needed to cover all valid ways the host may be accessed. 

DNS.1: Mandatory. Always set to the full FQDN of the host (e.g., server.company.com).

DNS.2: Recommended. Short hostname (e.g., server).

DNS.3: Optional. Additional FQDN, short name, or IP address — use this for aliases, VIPs, or any other name that might resolve to the same server.

email.x: Optional. Include if required by your CA or if you want the cert to bind to an email identity.

IP.x: Optional. Use IP.x only when you want clients to connect directly to the IP and still trust the cert. If you don’t add IP.x and someone connects to https://192.168.1.10 → the SSL check will fail because the cer
* ISO-kodenDette hyperlink fører dig til et websted uden for Dell Technologies. på to bogstaver for det land eller område, hvor organisationen er placeret.
 

Tilføj eller fjern DNS.x- og IP.x-poster efter behov.

Eksempel:

[req]
distinguished_name = req_distinguished_name
req_extensions = req_ext
prompt = no
[req_distinguished_name]
C   = US
ST  = Texas
L   = Round Rock
O   = Dell Technologies Inc.
OU  = Data Protection Team
CN  = server.fqdn.example.com    # Common Name - must match primary FQDN

# ================================
# Extensions for SAN
# ================================
[ req_ext ]
subjectAltName = @alt_names

[ alt_names ]
# DNS.1: Mandatory — fully qualified domain name (FQDN)
DNS.1 = server.fqdn.example.com

# DNS.2: Recommended — short hostname (without domain)
DNS.2 = servername

# DNS.3: Optional — additional FQDN, short name, or IP address
DNS.3 = server.alias.example.com

# Optional: include email if needed
#IP.1 = 192.1xx.1.10               # Literal IP address
#IP.2 = 10.1.1.5                   # Another IP if needed
#email.1 = admin@example.com
  1. Kør nedenstående kommando for at generere CSR og den private nøgle baseret på de oplysninger, der er tilføjet i filen server_cert.cnf.
#openssl req -new -newkey rsa:4096 -nodes -keyout new_server.key -out new_server.csr -config server_cert.cnf
  1. CSR'en indsendes til en certifikatmyndighed til underskrift. 

Additional Information

Bemærk: Linux-værter, der bruger NetWorker 19.12.0.0, understøtter OpenSSL 3.0.14. Windows kræver stadig 1.1.1n.


NetWorker: NMC GST-tjenesten starter og lukker straks ned efter udskiftning af cakey.pem

Affected Products

NetWorker, NetWorker Management Console
Article Properties
Article Number: 000251184
Article Type: How To
Last Modified: 16 Jul 2025
Version:  4
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.