56
Figure 54:
Settings Confirmation
4.4.3
RCCMD with own SSL certificates
In this chapter we will describe, how to use an own SSL certificate with RCCMD, e. g.
OpenSSL ( http://www.openssl.org ):
Be your own CA
Using OpenSSL it is quite simple to become your own CA. Just run:
CA.pl –newca
Done! Just ensure, that you select a useful CN (common name)!
Create your RCCMD certificate
You need to create your certificate for RCCMD now. As it will use it for verification, it should
contain the same useful common name (CN), that you selected for the CA. The private key
must not be encrypted to let the RCCMD Client (service) start without trouble. Therefore we
use the “–nodes” option and the “-newreq” command:
CA.pl –newreq -nodes
Sign with your CA:
CA.pl –sign
Now create an empty file
named “rccmd.pem“ and copy the cert information of
newcert.pem
(rccmd certificate),
newkey.pem
(private key) and
cacert.pem
(CA) into it. Please note, that the
exact copying is required to use it without trouble!
Use your own RCCMD certificate
Do the following steps at the RCCMD Client and every sender (e. g. UPS Web Manager):
Backup the existing “rccmd.pem”
Replace the existing “rccmd.pem” with your own
Restart the RCCMD Client
Restart the RCCMD Sender
RCCMD client as relay station)
Note:
The RCCMD timeout is 60 seconds, meaning that after this time the
communication to the RCCMD client will be stopped and a logfile entry
Содержание CS121BL
Страница 2: ......
Страница 68: ...66 Figure 72 HTTP Status Page Socomec Transfer Switch Figure 73 HTTP Status Page Eaton Transfer Switch ...
Страница 71: ...69 Figure 76 CS121 FTP Access Figure 77 CS121 FTP Context Menu Figure 78 CS121 FTP Folders ...
Страница 107: ...105 Figure 135 Internet Explorer LAN Proxy Einstellungen ...