9.12. TLS Command Reference

9.12.1. Command Hierarchies

9.12.1.1. Security TLS Commands

config
— system
— security
tls
cert-profile profile-name [create]
— no cert-profile profile-name
entry entry-id [create]
— no entry entry-id
cert cert-filename
— no cert
key key-filename
— no key
[no] send-chain
[no] ca-profile name
[no] shutdown
client-cipher-list name [create]
— no client-cipher-list name
cipher index name cipher-suite-code
— no cipher index
client-tls-profile name [create]
— no client-tls-profile name
cert-profile name
cipher-list name
[no] shutdown
server-cipher-list name [create]
— no server-cipher-list name
cipher index name cipher-suite-code
— no cipher index
server-tls-profile name [create]
— no server-tls-profile name
cert-profile name
cipher-list name
[no] shutdown
trust-anchor-profile name [create]
[no] trust-anchor ca-profile-name

9.12.1.2. LDAP TLS Profile Commands

config
— system
— security
— ldap
server server-index [create]
— no server server-index
tls-profile tls-profile-name

9.12.1.3. Admin Commands

admin
— certificate
reload type {cert | key | cert-key-pair} filename protocol protocol [key-file filename]

9.12.2. Command Descriptions

This section provides the CLI command descriptions.

9.12.2.1. Security TLS Commands

tls

Syntax 
tls
Context 
config>system>security
Description 

This command configures TLS parameters.

cert-profile

Syntax 
cert-profile profile-name [create]
no cert-profile profile-name
Context 
config>system>security>tls
Description 

This command configures TLS certificate profile information. The certificate profile contains the certificates that are sent to the TLS peer (server or client) to authenticate itself. It is mandatory for the TLS server to send this information. The TLS client may optionally send this information upon request from the TLS server.

The no form of the command deletes the specified TLS certificate profile.

Parameters 
profile-name—
Specifies the name of the TLS certificate profile, up to 32 characters in length.
create—
Keyword used to create the TLS certificate profile.

entry

Syntax 
entry entry-id [create]
no entry entry-id
Context 
config>system>security>tls>cert-profile
Description 

This command configures an entry for the TLS certificate profile. A certificate profile may have up to eight entries. Currently, TLS uses the entry with the smallest ID number when responding to server requests.

The no form of the command deletes the specified entry.

Parameters 
entry-id—
Specifies the identification number of the TLS certificate profile entry.
Values—
1 to 8

 

create—
Keyword used to create the TLS certificate profile entry.

cert

Syntax 
cert cert-filename
no cert
Context 
config>system>security>tls>cert-profile>entry
Description 

This command specifies the file name of an imported certificate for the cert-profile entry.

The no form of the command removes the certificate.

Default 

no cert

Parameters 
cert-filename—
Specifies the file name of the TLS certificate, up to 95 characters in length.

key

Syntax 
key key-filename
no key
Context 
config>system>security>tls>cert-profile>entry
Description 

This command specifies the file name of an imported key for the cert-profile entry.

The no form of the command removes the key.

Default 

no key

Parameters 
key-filename—
Specifies the file name of the key.

send-chain

Syntax 
[no] send-chain
Context 
config>system>security>tls>cert-profile>entry
Description 

This command enables the sending of certificate authority (CA) certificates, and enters the context to configure send-chain information.

By default, the system only sends the TLS server certificate or TLS client certificate specified by the cert command. If CA certificates are to be sent using send-chain, they must be in the chain of certificates specified by the config>system>security>pki>ca-profile command. The specification of the send-chain is not necessary for a working TLS profile if the TLS peer has the CA certificate used to sign the server or client certificate in its own trust anchor.

For example, given a TLS client running on SR OS, the ROOT CA certificate resides on the TLS server, but the subsequent SUB-CA certificate needed to complete the chain resides within SR OS. The send-chain command allows these SUB-CA certificates to be sent from SR OS to the peer to be authenticated using the ROOT CA certificate that resides on the peer.

The no form of the command disables the send-chain.

Default 

no send-chain

ca-profile

Syntax 
[no] ca-profile name
Context 
config>system>security>tls>cert-profile>entry>send-chain
Description 

This command enables a certificate authority (CA) certificate in the specified CA profile to be sent to the peer. Up to seven configurations of this command are permitted in the same entry.

The no form of the command disables the transmission of a CA certificate from the specified CA profile.

Parameters 
name—
Specifies the name of the certificate authority profile, up to 32 characters in length.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>tls>cert-profile
Description 

This command disables the certificate profile. When the certificate profile is disabled, it will not be sent to the TLS server.

The no form of the command enables the certificate profile and allows it to be sent to the TLS server.

Default 

shutdown

client-cipher-list

Syntax 
client-cipher-list name [create]
no client-cipher-list name
Context 
config>system>security>tls
Description 

This command creates a cipher list that the client sends to the server in the client Hello message. It is a list of ciphers that are supported and preferred by the SR OS to be used in the TLS session. The server matches this list against the server cipher list. The most preferred cipher found in both lists is chosen.

Parameters 
name—
Specifies the name of the client cipher list, up to 32 characters in length.
create—
Keyword used to create the client cipher list.

cipher

Syntax 
cipher index name cipher-suite-code
no cipher index
Context 
config>system>security>tls>client-cipher-list
config>system>security>tls>server-cipher-list
Description 

This command configures the cipher suite to be negotiated by the server and client.

Parameters 
index—
Specifies the index number. The index number provides the location of the cipher in the negotiation list, with the lower index numbers being higher in the negotiation list and the higher index numbers being at the bottom of the list.
Values—
1 to 255

 

cipher-suite-code—
Specifies the cipher suite code.
Values—
tls-rsa-with-null-md5
tls-rsa-with-null-sha
tls-rsa-with-null-sha256
tls-rsa-with-3des-ede-cbc-sha
tls-rsa-with-aes128-cbc-sha
tls-rsa-with-aes256-cbc-sha
tls-rsa-with-aes128-cbc-sha256
tls-rsa-with-aes256-cbc-sha256

 

client-tls-profile

Syntax 
client-tls-profile name [create]
no client-tls-profile name
Context 
config>system>security>tls
Description 

This command configures the TLS client profile to be assigned to applications for encryption.

Parameters 
name—
Specifies the name of the client TLS profile, up to 32 characters in length.
create—
Keyword used to create the client TLS profile.

cert-profile

Syntax 
cert-profile name
no cert-profile
Context 
config>system>security>tls>client-tls-profile
Description 

This command assigns a TLS certificate profile to be used by the TLS client profile. This certificate is sent to the server for authentication of the client and public key.

The no form of the command removes the TLS certificate profile assignment.

Parameters 
name—
Specifies the name of the TLS certificate profile, up to 32 characters in length.

cipher-list

Syntax 
cipher-list name
no cipher-list
Context 
config>system>security>tls>client-tls-profile
Description 

This command assigns the cipher list to be used by the TLS client profile for negotiation in the client Hello message.

Parameters 
name—
Specifies the name of the cipher list.

shutdown

Syntax 
[no] shutdown
Context 
config>system>security>tls>client-tls-profile
config>system>security>tls>server-tls-profile
Description 

This command administratively enables or disables the TLS profile. If the TLS profile is shut down, the TLS operational status will be down. Therefore, if the TLS profile is shut down, any application using TLS should not attempt to send any PDUs.

trust-anchor-profile

Syntax 
trust-anchor-profile name
no trust-anchor-profile
Context 
config>system>security>tls>client-tls-profile
config>system>security>tls>server-tls-profile>authenticate-client
Description 

This command assigns the trust anchor used by this TLS profile to authenticate the server or client.

The no form of the command removes the configured trust anchor profile.

Parameters 
name—
Specifies the name of the trust anchor profile.

server-cipher-list

Syntax 
server-cipher-list name [create]
no server-cipher-list name
Context 
config>system>security>tls
Description 

This command creates the cipher list that is compared against cipher lists sent by the client to the server in the client hello message. The list contains all ciphers that are supported and desired by SR OS for use in the TLS session. The first common cipher found in both the server and client cipher lists will be chosen. As such, the most desired ciphers should be added at the top of the list.

The no form of the command removes the cipher list.

Parameters 
name—
Specifies the name of the server cipher list, up to 32 characters in length.
create—
Keyword used to create the server cipher list.

server-tls-profile

Syntax 
server-tls-profile name [create]
no server-tls-profile name
Context 
config>system>security>tls
Description 

This command creates a TLS server profile. This profile can be used by applications that support TLS for encryption. The applications should not send any PDUs until the TLS handshake has been successful.

The no form of the command removes the TLS server profile.

Parameters 
name—
Specifies the name of the TLS server profile, up to 32 characters in length.
create—
Keyword used to create the TLS server profile.

authenticate-client

Syntax 
authenticate-client
Context 
config>system>security>tls>server-tls-profile
Description 

This command enters the context to configure client authentication parameters.

cert-profile

Syntax 
cert-profile name
no cert-profile
Context 
config>system>security>tls>server-tls-profile
Description 

This command assigns a TLS certificate profile to be used by the TLS server profile. This certificate is sent to the client for authentication of the server and public key.

The no form of the command removes the TLS certificate profile assignment.

Parameters 
name—
Specifies the name of the TLS certificate profile, up to 32 characters in length.

cipher-list

Syntax 
cipher-list name
no cipher-list
Context 
config>system>security>tls>server-tls-profile
Description 

This command assigns a cipher list to be used by the TLS server profile. This cipher list is used to find matching ciphers with the cipher list that is received from the client.

The no form of the command removes the cipher list.

Parameters 
name—
Specifies the name of the cipher list, up to 32 characters in length.

tls-re-negotiate-timer

Syntax 
tls-re-negotiate-timer timer-min
no tls-re-negotiate-timer
Context 
config>system>security>tls>server-tls-profile
Description 

This command configures the timed interval after which the server is triggered to send a Hello request message to all clients and force a renegotiation of the symmetric encryption key. When an interval of 0 is configured, the server will never send a hello request message.

Default 

tls-re-negotiate-timer 0

Parameters 
timer-min—
Specifies the interval, in minutes, after which the server is triggered to send a Hello request message.
Values—
0 to 65000

 

trust-anchor-profile

Syntax 
trust-anchor-profile name [create]
no trust-anchor-profile name
Context 
config>system>security>tls
Description 

This command configures a trust anchor profile to be used in the TLS profile. The trust anchor is used for authentication of the server certificate.

Parameters 
name—
Specifies the name of the trust anchor profile, up to 32 characters in length.
create—
Keyword used to create the trust anchor profile.

trust-anchor

Syntax 
[no] trust-anchor ca-profile-name
Context 
config>system>security>tls>trust-anchor-profile
Description 

This command configures a trust anchor with a CA profile used by the TLS profile. Up to eight CA profiles can be configured under the trust anchor. TLS will read the CA profiles one by one to try to authenticate the server certificate.

Parameters 
ca-profile-name—
Specifies the name of the TLS trust anchor, up to 32 characters in length.

9.12.2.2. LDAP TLS Profile Commands

server

Syntax 
server server-index [create]
no server server-index
Context 
config>system>security>ldap
Description 

This command adds or removes an LDAP server.

Parameters 
server-index—
Specifies the server index.
Values—
1 to 5

 

create—
Keyword used to create the server index.

tls-profile

Syntax 
tls-profile tls-profile-name
no tls-profile
Context 
config>system>security>ldap>server
Description 

This command assigns a TLS profile to the LDAP application. When a TLS profile is assigned, the LDAP application will send encrypted PDUs from the client to the LDAP server. If TLS is operationally down, the LDAP application should not send any PDUs.

Parameters 
tls-profile-name—
Specifies the name of the TLS client transport profile.

9.12.2.3. Admin Commands

reload

Syntax 
reload type {cert | key | cert-key-pair} filename protocol protocol [key-file filename]
Context 
admin>certificate
Description 

This command manually reloads the certificate or key cache.

Parameters 
type—
Specifies what item will be reloaded.
cert—
Specifies that a certificate cache will be reloaded.
key—
Specifies that a key cache will be reloaded.
cert-key-pair—
Specifies that a paired certificate and key cache will be reloaded.
filename—
Up to 95 characters.
protocol—
Specifies which protocol the certificate will be reloaded for.
Values—
ipsec, tls