Objective
This article describes how to create and install a self-signed certificate on a NetScaler appliance.
At times, you might not want to have a Secure Socket Layer (SSL) certificate signed by a known Certificate Authority (CA), such as VeriSign. For an internal testing purpose, you can create a self-signed certificate on a NetScaler appliance. However, most Web browsers reject the certificate if it is not signed by a trusted CA.To trust the self signed certificate root certificate should be imported to certificate store on working station or browser certificate store.
Instructions
To create and install a self-signed certificate, complete the following tasks:
Create a Private Key
To create a private key, complete the following procedure:
-
Log on to the NetScaler appliance by using the nsroot credentials.
-
In the Configuration utility, select the SSL node.
-
In the SSL page, click the Create RSA Key link available in the SSL Keys section.
-
Enter the appropriate values on the various fields of the Create RSA Key dialog box and click Create.
create ssl <Key_Type> <Key_File_Name> <bits> [-exponent ( 3 | F4 )] [-keyform <Key_Format>] [-des] [-des3] [-password <Password_String>]
In the preceding syntax, you can use RSA, DSA, or FIPS as the Key_Type and PEM or DER as the Key_Format.
Create a Certificate Signing Request
To create a certificate signing request, complete the following procedure:
-
Log on to the NetScaler appliance by using the nsroot credentials.
-
In the Configuration utility, select the SSL node.
-
In the SSL page, click the Create Certificate Request link available in the SSL Certificates section.
-
Enter the appropriate values on the various fields of the Create Certificate Request dialog box and click Create.
create ssl certreq <Certificate_Request_File_Name> [-keyFile <Key_File_Name>] [-fipsKeyName <string>] [-keyform <Key_Format>]
Note: Ensure that you use the private key file created in the Create a Private Key procedure.
Create a Certificate
To create a certificate, complete the following procedure:
-
Log in to the NetScaler appliance by using the nsroot credentials.
-
In the Configuration utility, select the SSL node.
-
In the SSL page, click the Create Certificate link available in the SSL Certificates section.
-
Enter the appropriate values on the various fields of the Create Certificate dialog box and click Create.
create ssl cert <Certificate_File_Name> < Certificate_Request_File_Name> <certType> -keyFile <Key_File_Name> -keyForm <Key_Format> [-days <Positive_Integer>] [-certForm <Certificate_Format>] [-CAcert <CA_Certificate_File_Name>] [-CAcertForm <CA_Certificate_Format>] [-CAkey <CA_Key_File_Name>] [-CAkeyForm <CA_Key_File_Name >] [-CAserial <CA_Serial_Number_File_Name>]
Note: Ensure that you use the private key and certificate request files created in the Create a Private Key and Create a Certificate Signing Request procedures, respectively.
Create a Certificate-Key Pair and Installing the Certificate
To install the certificate you have created, you need to create a certificate-key pair object. To create a certificate-key pair, complete the following procedure:
-
Log in to the NetScaler appliance by using the nsroot credentials.
-
In the Configuration utility, expand the SSL node.
-
Select Certificates.
-
On the SSL Certificates page, click Add.
-
Enter the appropriate values on the various fields of the Install Certificate dialog box and click Install.
<Certificate_Key_Name> -cert <Certificate_File_Name> -key <Key_File_Name> [-password]
Note: Ensure that you use the private key and certificate files created in the Create a Private Key and Create a Certificate procedures, respectively.
Additional Resources
Caveats
If you want to use web Interface on NetScaler, you must import the CA Certificate as a trusted root in the Web Interface java keystore, for use with callbacks.
If you want to connect to virtual servers that use the self-signed certificate from Android, Mac, iPhone, or iPad devices, then you must import the CA certificate into the device as a trusted root. There is no option on these devices to temporarily accept an SSL Certificate that was signed by a non-trusted Root.
Supporto Citrix
Traduzione automatica
Questo articolo ?? ¨ stato tradotto da un sistema di traduzione automatica e non ?? ¨ stata valutata da persone. Citrix fornisce traduzione automatica per aumentare l'accesso per supportare contenuti; tuttavia, articoli automaticamente tradotte possono possono contenere degli errori. Citrix non ?? ¨ responsabile di incongruenze, errori o danni derivanti dell'uso di articoli automaticamente tradotte.
Citrix技術支持
自動翻譯
這篇文章被翻譯由一個自動翻譯系統,並沒有受到人們的審查。 Citrix提供自動翻譯,增加獲得支持的內容;但是,自動翻譯的文章可能可以包含錯誤。思傑不負責不一致,錯誤或損壞因使用自動翻譯的文章的結果。
Поддержка Citrix
Tradução automática
Эта статья была переведена автоматической системой перевода и не был рассмотрен людьми. Citrix обеспечивает автоматический перевод с целью расширения доступа для поддержки контента; Однако, автоматически переведенные статьи могут может содержать ошибки. Citrix не несет ответственности за несоответствия, ошибки, или повреждения, возникшие в результате использования автоматически переведенных статей.
시트릭스 지원
자동 번역
이 문서 자동 번역 시스템에 의해 번역 된 사람들에 의해 검토되지 않았다. 시트릭스는 컨텐츠를 지원하기 위해 접근을 높이기 위해 자동 번역을 제공합니다; 그러나, 자동으로 번역 기사 오류를 포함 할 수있다. 시트릭스는 자동으로 번역 된 기사의 사용의 결과로 발생하는 불일치, 오류 또는 손해에 대해 책임을지지 않습니다.