![Broadcom NetXtreme BCM57 Series User Manual Download Page 25](http://html1.mh-extra.com/html/broadcom/netxtreme-bcm57-series/netxtreme-bcm57-series_user-manual_2815649025.webp)
Windows Driver and Management Application Installation
NetXtreme
User Guide
Broadcom
®
April 2017 • 2CS57XX-CDUM514-R
Page 25
3.
Use the following steps to generate a Certificate Signing Request (CSR).
During the generation of the CSR, you are prompted for several pieces of information. When prompted for
the “Common Name”, enter the Windows Server host name or IP address.
Enter the following command (sample responses are shown):
openssl req -new -key server.key -out server.csr
If this command does not work, try the following:
openssl req –new –key server.key –out server.csr –config openssl.cnf
The openssl.cnf file should be placed in the same directory where openssl is placed. Openssl.cnf is located
in the folder C:\Program Files (x86)\GnuWin32\share.
The following information is requested:
• Country Name (2 letter code) []:
US
• State or Province Name (full name) []:
California
• Locality Name (e.g., city) []:
Irvine
• Organization Name (e.g., company) []:
Broadcom Corporation
• Organizational Unit Name (e.g., section) []:
Engineering
• Common Name (e.g., YOUR name) []: Enter the host name or IP address of the Windows server. For
iPv6, enter the Common Name in the format [xyxy:xxx:….::xxx],
including the brackets [ ]
.
• (Optional) Email Address []:
Enter the following additional attributes to be sent with your certificate request:
• A challenge password []:
password1
• An optional company name []:
4.
Remove the passphrase from the key.
Enter the following commands:
cp server.key server.key.org
openssl rsa -in server.key.org -out server.key
5.
Generate a self-signed certificate:
To generate a self-signed certificate which is active for 365 days, enter the following command:
openssl x509 -req -days 365 -in server.csr -signkey server.key -out server.crt
The following output displays:
Signature ok
subject=/C=US/ST=California/L=Irvine/O=Broadcom Corporation/OU=Engineering/CN=MGMTAPP-
LAB3/emailAddress=
Getting Private key
6.
Enter the following command to verify the generated self-signed certificate.
openssl verify server.crt
The following output displays:
server.crt:/C=US/ST=California/L=Irvine/O=Broadcom Corporation/OU=Engineering/
CN=MGMTAPP- LAB3/emailAddress=
error 18 at 0 depth lookup:self signed certificate
OK
Ignore the error message “error 18 at 0 depth lookup:self signed certificate”. This error indicates that this is
a self-signed certificate.
7.
Convert the certificate from “crt” to “pkcs12” format, as follows:
For a Windows server, the certificate should be in pkcs12 format. Enter the following command:
Summary of Contents for NetXtreme BCM57 Series
Page 1: ...Broadcom NetXtreme BCM57XX User Guide Last revised April 2017 2CS57XX CDUM514 R...
Page 16: ...Functionality and Features NetXtreme User Guide Broadcom April 2017 2CS57XX CDUM514 R Page 16...
Page 169: ...Regulatory Information NetXtreme User Guide Broadcom April 2017 2CS57XX CDUM514 R Page 169...
Page 170: ...Regulatory Information NetXtreme User Guide Broadcom April 2017 2CS57XX CDUM514 R Page 170...
Page 171: ...Regulatory Information NetXtreme User Guide Broadcom April 2017 2CS57XX CDUM514 R Page 171...