Working in the CLI
Certificate Revocation List Commands
The
crl
context provides commands for managing Certificate Revocation Lists (or CRLs). CRLs can
be used to verify that the certificates used by Equalizer are valid and have not been compromised.
A CRL is uploaded to Equalizer using commands in the
crl
context, and then associated with one or
more clusters in the cluster specific context. Whenever a certificate is used to authenticate a
connection to the cluster, the CRL is checked to make sure the certificate being used has not been
revoked. The supported commands in the
crl
context are shown in the following tables.
Note
- If a CRL attached to a cluster was generated by a Certificate Authority (CA) different from the CA used to gen-
erate a client certificate presented when connecting to the cluster, an error occurs. The CRL and client certificate must
be signed by the same CA.
Using CRL Commands in the Global Context
eqcli >
certificate
certname [cmd ...]
: Create certname (
req_cmds
= *
commands below)
eqcli >
certificate
certname cmd
...
: Modify
certname (cmd
= any com-
mands below)
eqcli >
no certificate
certname
: Delete
certname
eqcli >
show certificate [
certname
]
: Display all certificates or
certname
eqcli >
certificate
certname
: Change to "cert-certname" con-
text (see below)
Using CRL Commands in a CRL specific Context
eqcli crl-crlname>
crlfile
{edit|url}
: Upload the CRL
eqcli crl-crlname>
show
: Display CRL crlname
The arguments to the
crlfile
command are:
l
edit -
Launch an editor to supply the content of the CRL file.
l
url -
Download the CRL file from the
ftp://
or
http://
protocol URL supplied on the command line.
168
Copyright © 2014 Coyote Point Systems, A Subsidiary of Fortinet, Inc.
Summary of Contents for Equalizer GX Series
Page 18: ......
Page 32: ...Overview 32 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 42: ......
Page 52: ......
Page 64: ......
Page 72: ......
Page 76: ......
Page 228: ......
Page 238: ......
Page 476: ......
Page 492: ......
Page 530: ......
Page 614: ......
Page 626: ......
Page 638: ......
Page 678: ......
Page 732: ...Using SNMP Traps 732 Copyright 2014 Coyote Point Systems A Subsidiary of Fortinet Inc ...
Page 754: ......
Page 790: ......
Page 804: ......
Page 842: ......
Page 866: ......