ENM Network Security Configuration System Administrator Guide
ENM Network Security Configuration System Administrator Guide
Operating Instructions
© Ericsson AB 2018 - 2022. All rights reserved. No part of this document may be
reproduced in any form without the written permission of the copyright owner.
Disclaimer
The contents of this document are subject to revision without notice due to
continued progress in methodology, design and manufacturing. Ericsson shall
have no liability for any error or damage of any kind resulting from the use of this
document.
Trademark List
All trademarks mentioned herein are the property of their respective owners.
These are shown in the document Trademark Information.
Contents
2 Connect to a Service 2
2.1 Connect to a Virtual Machine on a Physical ENM Deployment 2
2.1.1 Connect to each ENM Physical Node 3
2.2 Connect to a Service on an ENM on Cloud Deployment 3
2.3 Connect to a Container in Cloud Native ENM 5
2.4 View Log Files and Dump Locations 6
3 Restart a Service 7
3.1 Restart a Service on a Physical ENM Deployment 7
3.2 Restart a Service on an ENM on Cloud Deployment 8
3.3 Restart an ENM Service on a Cloud Native ENM 9
5.8.1.3 Configure Single Sign-On (SSO) for R6000 Node Access Using
LDAP 37
5.8.2 Configure Single Sign-On (SSO) for Node Access (EPG and
IMS Nodes) 39
5.8.2.1 Enable Single Sign-On 40
5.8.2.2 Disable Single Sign-On 40
5.8.2.3 User Credential when Launching NodeCLI 41
17.3 Get Real Time Security Event Logging (RTSEL) Status for
Baseband Radio Network Elements 404
This document describes the Network Security Configuration (NSC) for ENM.
Prerequisites
It is required that the user:
— Has knowledge on ENM.
— Has knowledge on computer security, private and public key technology and
X.509 certificates.
Target Groups
Security Administrator
Typographical Conventions
The typographical conventions for all Customer Product Information (CPI) in
ENM are found in ENM Library Typographic Conventions, Reference [20].
2 Connect to a Service
Prerequisites
A command window is open and you have superuser privileges.
Steps
1. Log on to the ENM Management Server (MS) as litp-admin user and switch
to the root user.
2. List the contents of the host file to view all connected VMs within the
deployment.
The aliases for the parallel VMs take the form of <SVC host>-<service>.
3. To access the VM, copy the private key of the cloud-user from its secure
location to the MS or SVC node.
To access the VM, use the cloud-user user ID and include the path to the VM
private key. For example:
Prerequisites
— The root password was changed during the installation process and must
be known by the system administrator. This must be repeated on all newly
deployed ENM nodes.
Steps
Note: Once connected, after the initial deployment, the passwords for
both the litp-admin and root users must be changed.
Prerequisites
— You have access to the private key file for authentication, contact your
OpenStack administrator.
Steps
Using the private key for authentication, copy the key to the EMP server. Log
on to EMP server and list the consul members to view all connected VMs
within the deployment:
Prerequisites
— Client machine that can reach Kubernetes cluster API handling Cloud Native
ENM.
— The required kubeconfig file is available to access the cluster on which Cloud
Native ENM is deployed.
Steps
Example
3. Get the names of each container within a POD use the following.
Example
# kubectl get pod wpserv-0 -n enm48 -o jsonpath={.spec.containers[*].name}
wpserv wpserv-monitoring wpserv-httpd
4. Log on to a container using the kubectl exec command. The -c flag is used
to select which container within the pod is accessed.
Example
# kubectl exec -it wpserv-0 -c wpserv-httpd <namespace> -- bash
wpserv-0:/ #
Logs
All logs are configured to be forwarded to the Central Log Service. As such they
are visible in Log Viewer using the ENM Launcher.
JBOSS Logs
All JBOSS logs are stored locally in /ericsson/3pp/jboss/standalone/log
Dumps
All application memory and core dump files are located in /ericsson/enm/dumps
3 Restart a Service
Prerequisites
— Root access to MS.
Steps
1. Establish the service instances installed on the ENM deployment using grep
for a particular service instance:
Example
[root@ieatlms4352 ~]# /opt/ericsson/enminst/bin/vcs.bsh --groups | grep msp →
m
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb2539-1 parallel vm ONLINE OK -
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb4373 parallel vm ONLINE OK -
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb4374 parallel vm ONLINE OK -
Example
/opt/ericsson/enminst/bin/vcs.bsh --restart -g Grp_CS_svc_cluster_mspm -s ie →
atrcxb4373
[root@ms-1 bin]# bash vcs.bsh --restart -g Grp_CS_svc_cluster_mspm -s ieatrc →
xb4373
2020-07-23 12:02:04.481 INFO hagrp_offline : Offlining 1 group(s)
2020-07-23 12:02:04.515 INFO hagrp_offline : Offlining Grp_CS_svc_cluster_ms →
pm on ieatrcxb4373
2020-07-23 12:02:04.807 INFO wait_vcs_state : Waiting for Grp_CS_svc_cluster →
_mspm to go OFFLINE on ieatrcxb4373 (timeout=1800)
2020-07-23 12:05:43.185 INFO wait_vcs_state : Group Grp_CS_svc_cluster_mspm →
now OFFLINE on ieatrcxb4373 (3m:39s)
2020-07-23 12:05:43.817 INFO hagrp_online : Onlining 1 group(s)
2020-07-23 12:05:43.822 INFO online_services : Onlining Grp_CS_svc_cluster_m →
spm on ieatrcxb4373
2020-07-23 12:05:44.057 INFO wait_vcs_state : Waiting for Grp_CS_svc_cluster →
_mspm to go ONLINE on ieatrcxb4373 (timeout=4500)
2020-07-23 12:09:03.400 INFO wait_vcs_state : Group Grp_CS_svc_cluster_mspm →
now ONLINE on ieatrcxb4373 (3m:19s)
[root@ms-1 bin]#
Example
[root@ieatlms4352 ~]# /opt/ericsson/enminst/bin/vcs.bsh --groups | grep msp →
m
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb2539-1 parallel vm ONLINE OK -
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb4373 parallel vm ONLINE OK -
svc_cluster Grp_CS_svc_cluster_mspm ieatrcxb4374 parallel vm ONLINE OK -
4. After the service restarted in Step 2 is ONLINE, you can repeat Step 2 and
Step 3 to restart further instances of the service as per your requirement.
Prerequisites
— User connected to EMP server.
Steps
Example
#consul members | grep mscm
#pkill consul
4. After the restarted service is ONLINE, repeat the preceding two steps to
restart further instances of the service as per your requirement.
Prerequisites
— A client machine that can reach Kubernetes cluster API handling Cloud
Native ENM.
— The required kubeconfig file is available to access the cluster on which Cloud
Native ENM is deployed.
— The required namespace associated with the Cloud Native ENM deployment.
Steps
Example
# kubectl get deployment -n enm101 | grep "mscm "
mscm 2/2 2 2 3d1h
Example
# kubectl rollout restart deployment mscm -n enm101
deployment.apps/mscm restarted
c. Verify that all the Pods of the deployment are up and running.
Check the status by retrieving the deployment.
Example
# kubectl rollout status deployment mscm -n enm101
Waiting for deployment "mscm" rollout to finish: 1 out of 2 new rep →
licas have been updated...
Result:
Example
# kubectl get pods -n enm101 | grep mscm-
mscm-76f9c758fb-4hjxf 3/3 Running 0 1d
mscm-57544df8bd-j42pt 3/3 Running 0 1d
Example
# kubectl delete pod mscm-76f9c758fb-4hjxf -n enm101
c. Verify that the Pod is up with all the containers Running that is, 1/1,
2/2, 3/3, or 4/4:
Check the status by retrieving the Pod.
Example
# kubectl get pods -n enm101 | grep mscm-
mscm-57544df8bd-hsnbq 3/3 Running 0 2m39s
mscm-57544df8bd-j42pt 3/3 Running 0 1d
d. After the restarted Pod is up with all the containers Running, repeat
the same steps to restart the other Pods of same service if required.
4. Verify if the Pod is up with all the containers Running that is 1/1, 2/2, 3/3, or
4/4. Check the status by retrieving the Pod.
Example
# kubectl get pods -n enm101 | grep mscm-
mscm-57544df8bd-hsnbq 3/3 Running 0 2m39s
mscm-57544df8bd-j42pt 3/3 Running 0 1d
5. After the restarted Pod is up with all the containers Running, repeat the
same steps to restart other Pods of the service if required.
Prerequisites
Steps
Example
To check value of the SMRS_ERBS_NoOf_BACKUP_FILES parameter:
Example
To update the SMRS_ERBS_NoOf_BACKUP_FILES value to 4:
Example
To reset netconfCapabilities:
Results
An application parameter is updated or reset using the script.
Prerequisites
Steps
Results
An application parameter is updated or reset using the configuration script.
Prerequisites
Steps
1. Log on ENM.
In each case, the file can be searched for the parameter and it can be verified
if the parameter has a serviceIdentifier or jvmIdentifier associated to
it.
Example
admin parameter view --name protocolInfo --service_identifier mediationservi →
ce --app_server_identifier mscmce-8495ffcdb4-lcj8t
Result:
protocolInfo: CM
Results
A configuration parameter value is viewed through the ENM CLI.
Prerequisites
Steps
1. Log on ENM.
In each case, the file can be searched for the parameter and it can be verified
if the parameter has a serviceIdentifier or jvmIdentifier associated to
it.
Example
admin parameter modify --name protocolInfo --value PM --service_identifier m →
ediationservice --app_server_identifier mscmce-8495ffcdb4-lcj8t
Result:
Parameter protocolInfo updated successfully.
Results
A configuration parameter value has been updated through the ENM CLI.
Prerequisites
Steps
1. Log on ENM.
In each case, the file can be searched for the parameter and it can be verified
if the parameter has a serviceIdentifier or jvmIdentifier associated to
it.
Example
admin parameter reset --name protocolInfo --service_identifier mediationserv →
ice --app_server_identifier mscmce-8495ffcdb4-lcj8t
Result:
protocolInfo: CM
Results
A configuration parameter is reset as expected.
These tasks provide the features to access to the node through node
credentials (encrypted passwords) or through SSH public key.
The node credentials are needed to access to the nodes and depend on either the
feature, the node type or both. They are mandatory for:
— Node SSH key
— Trust Distribution
Note: The credentials must be already stored on the nodes before to perform
any administrative task.
Create and update credentials are performed on the ENM only. The
Node Credentials administrative task does not perform any automatic
certificate creation or update on the node.
— normal
— root
— nodecli user
The nodecli user credentials are supported for all the node types and these
are optional. The nodecli user credentials are used while launching the Launch
Node CLI application.
The credentials are set in the Data Persistence Service (DPS), that is the
NetworkElementSecurity MO.
The configuration of one or more of the node credentials depends on the node
type.
Table 1
Node Type Secure Credentials Normal Credentials Root Credentials
BSC Yes No No
ERBS Yes Yes Yes
MINI-LINK Indoor Yes Yes Yes
MINI-LINK-CN210 Yes Yes Yes
MINI-LINK-CN510R1 Yes Yes Yes
MINI-LINK-CN510R2 Yes Yes Yes
MINI-LINK-CN810R1 Yes Yes Yes
MINI-LINK-CN810R2 Yes Yes Yes
MINI-LINK-665x Yes Yes Yes
MINI-LINK-669x Yes Yes Yes
MINI-LINK-6371 Yes Yes Yes
MINI-LINK-6366 Yes Yes Yes
MINI-LINK-6352 Yes Yes Yes
MINI-LINK-6351 Yes Yes Yes
MINI-LINK-PT2020 Yes Yes Yes
MGW Yes Yes Yes
SGSN-MME Yes No No
Router6672 Yes No No
Router6274 Yes No No
Router6675 Yes No No
Router6x71 Yes No No
Router6273 Yes No No
Router6673 Yes No No
SAPC Yes Yes Yes
EPG Yes Yes Yes
VEPG Yes Yes Yes
Fronthaul 6080 Yes Yes Yes
Fronthaul 6020 Yes Yes Yes
Fronthaul-6392 Yes Yes Yes
Switch-6391 Yes Yes Yes
RNC Yes Yes Yes
NodeB DU RadioNode Yes Yes Yes
For detailed information on secadm credentials command, see ENM CLI online
help.
If the node supports LDAP, then the low privileged user needs to be created
on the ENM. If the node supports Local User Authentication and Authorization
only (if the node does not support LDAP), then the user needs to be created
locally on the node. After creating the low privileged user, its credentials can be
configured to NodeCli user credentials on ENM. If the NodeCli user credentials
are not configured on the ENM, then root or normal or secure or nwiebsecureuser
or nwieasecureuser credentials are used based on the node type while launching
the Node CLI.
All parameters are not always required: mandatory ones depend on the involved
NE Type.
Actors
Node-Security Administrator, Action: create, Resource: credentials.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
All the credentials are successfully set in the ENM.
The Create Node Credentials command can enable or disable the usage of
ENM predefined internal user (ldapApplicationUser) for Network Elements
supporting Centralized AA.
This can be done using an extra input parameter ldapuser with values disable or
enable.
If such Network Element have been configured without LDAP, this setting must
be disabled to avoid connectivity issues.
The outcome of this additional input parameter can be verified getting the
NetworkElementSecurity MO.
FDN : NetworkElement=CORE42ML01,SecurityFunction=1,NetworkElementSecurity=1
NetworkElementSecurityId : 1
algorithmAndKeySize : RSA_1024
enmSshPrivateKey : null
enmSshPublicKey : null
enrollmentMode : NOT_SUPPORTED
ldapApplicationUserName : null
ldapApplicationUserPassword : null
nodeCliUserName :
nodeCliUserPassword : bTyZrf6IJT/v9BOGqXJYezLvXAB5pUkH/dXLe2+xa2I=
normalUserName :
normalUserPassword : /0OwW+I9/QRzENNBSLW/lJwOS9o/ULt6LFDVkHuS1DQ=
nwieaSecureUserName : null
nwieaSecureUserPassword : null
nwiebSecureUserName : null
nwiebSecureUserPassword : null
rootUserName :
rootUserPassword : AkDv1iaYOJMd1MGosDNpv2LcrdjMKKGVTncR354pBNQ=
secureUserName : public
secureUserPassword : 5qAIKx+sMfY+gZQRquwnD2PLJ9i6+DD7EOY8ZbPGnB4=
snmpAuthKey : null
snmpAuthProtocol : NONE
snmpPrivKey : null
snmpPrivProtocol : NONE
summaryFileHash : null
targetGroups : null
FDN : NetworkElement=LTE04dg2ERBS00036,SecurityFunction=1,NetworkElementSecurity →
=1
NetworkElementSecurityId : 1
algorithmAndKeySize : RSA_1024
enmSshPrivateKey : null
enmSshPublicKey : null
enrollmentMode : CMPv2_VC
ldapApplicationUserName : ldapApplicationUser
ldapApplicationUserPassword : OEPc3O7drI5C/qBBH8IaTiqZZwbpWh5wv1ECoUYPT4nHiJJz/Q →
HsfAcYEyo1VHks6CbVb9UmU7iILS2ztzC+tA==
nodeCliUserName :
nodeCliUserPassword : bTyZrf6IJT/v9BOGqXJYezLvXAB5pUkH/dXLe2+xa2I=
normalUserName : null
normalUserPassword : null
nwieaSecureUserName : null
nwieaSecureUserPassword : null
nwiebSecureUserName : null
nwiebSecureUserPassword : null
rootUserName : null
rootUserPassword : null
secureUserName : netsim
secureUserPassword : r3+aHbUJ3DyIsZ1y9kHkxj7d+ct/GGkWwl2ZeDYXLoU=
snmpAuthKey : null
snmpAuthProtocol : NONE
snmpPrivKey : null
snmpPrivProtocol : NONE
summaryFileHash : null
targetGroups : [defaultTargetGroup]
If the --ldpauser attribute is not explicity provided, its default value is enable.
If the Network Element supports LDAP and it is required to use secureuser
credentials instead of ldapApplicationUser, the operator has to disable the
predefined one providing the option --ldapuser disable every time performing
secadm credentials create or secadm credentials update .
FDN : NetworkElement=MTAS01,SecurityFunction=1,NetworkElementSecurity=1
NetworkElementSecurityId : 1
algorithmAndKeySize : RSA_1024
enmSshPrivateKey : null
enmSshPublicKey : null
enrollmentMode : CMPv2_INITIAL
ldapApplicationUserName :
ldapApplicationUserPassword :
nodeCliUserName : null
nodeCliUserPassword : null
normalUserName : null
normalUserPassword : null
nwieaSecureUserName : null
nwieaSecureUserPassword : null
nwiebSecureUserName : null
nwiebSecureUserPassword : null
rootUserName : null
rootUserPassword : null
secureUserName : newuser2
secureUserPassword : Qx2bnWrUVfa6e+gdnX+caEzF9LXEltYWkO4D6tiMTLo=
snmpAuthKey : null
snmpAuthProtocol : NONE
snmpPrivKey : null
snmpPrivProtocol : NONE
summaryFileHash : null
targetGroups : [defaultTargetGroup]
For detailed information on secadm credentials command, see ENM CLI online
help.
Note: Once the NodeCLI user credentials are created, they cannot be updated
back with empty or null values using secadm commands.
All parameters are not always allowed: supported ones depend on the involved
NE Type.
As a consequence, when a list of nodes is specified in the command, all the nodes
must support the requested parameter to update. Otherwise the command is
rejected.
Actors
Node-Security Administrator, Action: update, Resource: credentials.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
All the updated credentials are successfully updated in the ENM.
The Update Node Credentials command can enable or disable the ldapuser
for Network Elements supporting Centralized AA.
See the section Enable and Disable ldapuser on page 23 for more details.
For them, this task provides a mechanism to generate an SSH key pair. After
encryption, an SSH session is opened to the node and the public key is stored on
it.
Actors
Node-Security Administrator, Action: create, Resource: sshkey.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
SSH session is opened by ENM to the node and enmSshPublicKey is copied on
the Node.
If success:
If fail:
Note: The node can have some limitation in the handling of the SSH public key
(for example, for MME node, see the section Enabling SSH Key-Based
Logon for Internal User Accounts in the document Operator Access
Handling). Always check the Node CPI before proceeding.
This use case is needed to cover the case ssh-key create have been
compromised.
Actors
Node-Security Administrator, Action: update, resource: sshkey.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
SSH session is opened by ENM to the node and enmSshPublicKey is copied on
the Node.
If success:
If fail:
Note: The node can have some limitation in the handling of the SSH public key
(for example, for MME node, see the section Enabling SSH Key-Based
Logon for Internal User Accounts in the document Operator Access
Handling). Always check the Node CPI before proceeding.
Actors
Node-Security Administrator, Action: import, resource: sshkey.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
— Node Type must support sshkey import mechanism and Key set must be
generated externally to ENM.
Steps
Results
Node SSH private key is imported into ENM.
If success:
If fail:
Note: The node can have some limitation in the handling of the SSH public key
(for example, for MME node, see the section Enabling SSH Key-Based
Logon for Internal User Accounts in the document Operator Access
Handling). Always check the Node CPI before proceeding.
For detailed information on secadm credentials command, see ENM CLI online
help.
Actors
Node-Security Administrator, Action: read, Resource: credentials.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
Table 2
Node Username User Password
LTE03ERBS00159 rootUserName:root rootUserPassword:***********
LTE03ERBS00159 secureUserName:secureuser secureUserPassword:***********
LTE03ERBS00159 normalUserName:normaluser normalUserPassword:***********
LTE03ERBS00159 nodeCliUserName:nodecliuser nodeCliUserPassword:***********
For detailed information on secadm credentials command, see ENM CLI online
help.
Actors
Node-Security Administrator, Action: read, Resource: Credentials-Plain-Text.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
Table 3
Node Username User Password
LTE03ERBS00159 rootUserName:root rootUserPassword:rootpassword
LTE03ERBS00159 secureUserName:secureuser secureUserPassword:securepassword
LTE03ERBS00159 normalUserName:normaluser normalUserPassword:normalpassword
LTE03ERBS00159 nodeCliUserName:nodecliuser nodeCliUserPassword:nodeclipassword
5.8.1 Configure Single Sign-On (SSO) for Node Access (Transport Nodes)
To allow SSO, it is mandatory that the TACACS+/RADIUS/LDAP server is
connected and enabled on the node.
Table 4
Nodes
MINI-LINK Indoor
MINI-LINK 6351
MINI-LINK 6352
MINI-LINK PT 2020
MINI-LINK-CN210
MINI-LINK-CN510R1
MINI-LINK-CN510R2
MINI-LINK-CN810R1
MINI-LINK-CN810R2
Nodes
MINI-LINK-669x
MINI-LINK-6371
MINI-LINK-6366
MINI-LINK-665x
Fronthaul 6392
Fronthaul 6020
Switch 6391
JUNIPER-MX
JUNIPER-SRX
JUNIPER-PTX
JUNIPER-vMX
JUNIPER-vSRX nodes
Router6672
Router6675
Router6x71
Router6274
Router6273
Router6673
Prerequisites
— TACACS+/RADIUS/LDAP must be enabled on node.
— The nodes must have Node Security administrator role to use the sso
enable command.
Table 5
ENM Role MINI-LINK Juniper Node Fronthaul Router 6000
Node Role Role Node Role Node Role
NodeCLI_Sys admin superuser admin Privilege - 15
tem_
Administrato
r
NodeCLI_Ad control superuser user Privilege - 10
ministrator
NodeCLI_Op view operator guest Privilege - 3
erator
Steps
— Add Node
— Network Discovery
— Auto Provisioning
Results
Node CLI or Element Manager is launched successfully using ENM credentials.
The Single Sign-On (SSO) command can enable the usage of ENM users for
Network Elements supporting TACACS+/RADIUS/LDAP.
This can be done using secadm sso command with enable value.
Prerequisites
Steps
1. Enable SSO.
Run the following ENM CLI command:
FDN : NetworkElement=CORE82MLTN76,SecurityFunction=1,NetworkElementSecurity= →
1
NetworkElementSecurityId : 1
algorithmAndKeySize : RSA_1024
enmSshPrivateKey : null
enmSshPublicKey : null
enrollmentMode : NOT_SUPPORTED
ldapApplicationUserName : null
ldapApplicationUserPassword : null
nodeCliUserName : Not Configured
nodeCliUserPassword : ibiJAV5EMjVgwviFlhC0sk5fjzEhUUiGPd8nOumHJng=
normalUserName : CORE82MLTN76
normalUserPassword : JeaA4Lwqfmjp7FgRJq/7VtEbJewBNJC83YDH6gBMvcQ=
nwieaSecureUserName : null
nwieaSecureUserPassword : null
nwiebSecureUserName : null
nwiebSecureUserPassword : null
rootUserName : CORE82MLTN76
rootUserPassword : EUF9OEwCc/teAzljidwYt/nHZbphJUGSomUwAZSWNJ8=
secureUserName : CORE82MLTN76
secureUserPassword : KitIhyaF7kORcNH6z0+NNDIYAGqw1U87yz6RKDgK0rc=
snmpAuthKey : JFcmxSMfLg/1eJm6Eby7KqhfiE3z1qQsmSfB7Vq2mhQ=
snmpAuthProtocol : SHA1
snmpPrivKey : gAps7eNpwVUhxWdNjRw+pkw2btgxEA4Ue4DwqxrpJo0=
snmpPrivProtocol : DES
SSO : true
summaryFileHash : null
targetGroups : [defaultTargetGroup]
The Single Sign-On (SSO) command can disable the usage of ENM users for
Network Elements supporting TACACS+/RADIUS/LDAP.
This can be done using secadm sso command with disable value.
Prerequisites
Steps
1. Disable SSO.
Run the following ENM CLI command:
FDN : NetworkElement=CORE82MLTN76,SecurityFunction=1,NetworkElementSecurity= →
1
NetworkElementSecurityId : 1
algorithmAndKeySize : RSA_1024
enmSshPrivateKey : null
enmSshPublicKey : null
enrollmentMode : NOT_SUPPORTED
ldapApplicationUserName : null
ldapApplicationUserPassword : null
nodeCliUserName : Not Configured
nodeCliUserPassword : ibiJAV5EMjVgwviFlhC0sk5fjzEhUUiGPd8nOumHJng=
normalUserName : CORE82MLTN76
normalUserPassword : JeaA4Lwqfmjp7FgRJq/7VtEbJewBNJC83YDH6gBMvcQ=
nwieaSecureUserName : null
nwieaSecureUserPassword : null
nwiebSecureUserName : null
nwiebSecureUserPassword : null
rootUserName : CORE82MLTN76
rootUserPassword : EUF9OEwCc/teAzljidwYt/nHZbphJUGSomUwAZSWNJ8=
secureUserName : CORE82MLTN76
secureUserPassword : KitIhyaF7kORcNH6z0+NNDIYAGqw1U87yz6RKDgK0rc=
snmpAuthKey : JFcmxSMfLg/1eJm6Eby7KqhfiE3z1qQsmSfB7Vq2mhQ=
snmpAuthProtocol : SHA1
snmpPrivKey : gAps7eNpwVUhxWdNjRw+pkw2btgxEA4Ue4DwqxrpJo0=
snmpPrivProtocol : DES
SSO : false
summaryFileHash : null
targetGroups : [defaultTargetGroup]
5.8.1.3 Configure Single Sign-On (SSO) for R6000 Node Access Using LDAP
If ENM LDAP server is used as remote authentication server, user credentials are
already in the ENM LDAP directory.
For Router6000, user credential used when launching the NodeCLI depends not
only on the enable of the SSO attribute but also on LDAP/TACACS+/RADIUS
configuration.
Table 6
ENM LDAP
ENABLED DISABLED
SSO SSO
ENABLED DISABLED ENABLED DISABLED
NODE CLI USER OPERATOR ldapApplicationU OPERATOR SECURE USER
CREDENTIAL ser CREDENTIAL
Table 7
TACACS+/RADIUS
CONFIGURED NOT CONFIGURED
SSO SSO
ENABLED DISABLED ENABLED DISABLED
NODE CLI USER OPERATOR SECURE USER OPERATOR SECURE USER
CREDENTIAL CREDENTIAL
Note: Authenti
cation
fails as
user is
not
configur
ed in
TACACS
+/
RADIUS
server.
To configure LDAP for Router6000, see the following ENM CPI documents:
— Section LDAP configuration for ROUTER6000 Family in ENM Operators
Guide, Reference [5].
For more details on how privileges work for Router6000 nodes, see the section
Assigning Administrators Different Privilege Levels in the Node CPI document
Restrict access to the CLI, Reference [24].
Two of them can be assigned to the operator: one for start and one for max.
The node converts the role to the equivalent privilege level and user access is
restricted accordingly.
The node feature is described in the section Start and Max privilege for LDAP
user of the Node CPI document LDAP for administrator, Reference [25].
Before assigning two roles to the user, they need to be defined in ENM as “COM
roles” using the ENM Role Management application.
5.8.2 Configure Single Sign-On (SSO) for Node Access (EPG and IMS Nodes)
The Single Sign On for the Node CLI application is possible if the node is
configured to apply the centralized authentication and authorization towards
the ENM LDAP server.
Alternatively, in case the node cannot support the LDAP protocol with the ENM, a
local account in the node must exist with the exact same credentials of the ENM
user (username and password).
The Single Sign On can be configured from the ENM Command Line Interface.
Table 8
Nodes
EPG
EPG-OI
vEPG
vEPG-OI
vMTAS
vBGF
vCSCF
Prerequisites
— LDAP must be enabled on node (if supported) OR the user created on the
node has the same credentials of the user used in ENM.
— The ENM user has sufficient privileges to run the Node CLI application.
Steps
— Add Node
Results
Node CLI is launched successfully using ENM credentials.
The Single Sign-On (SSO) command can enable ENM users to access
Network Elements supporting LDAP or Network Elements with users having
the same credentials of ENM users.
This can be done using secadm sso command with enable value.
Prerequisites
Steps
1. Enable SSO.
Run the following ENM CLI command:
The Single Sign-On (SSO) command can disable ENM users to access
Network Elements supporting LDAP or Network Elements with users having
the same credentials of ENM users.
This can be done using secadm sso command with disable value.
Prerequisites
Steps
1. Disable SSO.
Run the following ENM CLI command:
User credential used when launching the NodeCLI depends not only on the
enable of the SSO attribute but also on LDAP configuration (if supported).
See the following tables for details (in case of LDAP is not supported consider the
LDAP disable column).
Table 9
ENM LDAP
ENABLED DISABLED
SSO SSO
ENABLED DISABLED ENABLED DISABLED
NODE CLI USER OPERATOR ldapApplicationU OPERATOR secureUserName
CREDENTIAL ser CREDENTIAL (if
nodeCliUserNam
Node certificate contains the ENM-related business logic for the following:
— Issue and reissue a certificate.
If the same trust certificate is already present among the trust certificates
installed in the node, that trust certificate is not redistributed again.
For DG2 nodes, if the same trust certificate is already present among the trust
certificates installed in the node, that trust certificate is not distributed again.
For CPP nodes, if the same trust certificate is already present in the required trust
category, then the trust certificate is not distributed again.
Actors
If input certificate type is IPsec, the actors are:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
1. Distribute the trust certificate or the trust certificate chain to the nodes.
Run the following ENM CLI command to verify if trust certificates are
distributed successfully:
— The IPsec Trust Distribute and Get use cases are failed
if more than one Ikev2PolicyProfile is present on the
node.
b. If the value of the enforcedIKEv2PolicyProfileID
configuration parameter is other than NONE, then:
— The IPsec Trust Distribute and Get use cases use the
Ikev2PolicyProfile MO whose Ikev2PolicyProfileId
value is same as the configuration parameter value to
update or get the TrustCategory MO FDNs.
Results
A job for trust distribution to nodes is successfully started.
Note: If the trust distribute job is successful, then the node has new
certificates. If the node is in SL2, newly distributed certificate details
are not listed immediately in the ENM, but this does not have any impact
on the dependent use cases.
Actors
If input certificate type is IPsec, the actors are as follows:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
— secserv
Note: For Baseband Radio Nodes, the behavior of the IPsec Certificate
Get use case with the different enforcedIKEv2PolicyProfileID
parameter values is as follows:
— The IPsec Certificate Get use case is failed if more than one
Ikev2PolicyProfile is present on the node.
— The IPsec Certificate Get use case does not list any
certificates if no Ikev2PolicyProfile is found with
the matching Ikev2PolicyProfileId value as given
configuration parameter value.
c. For more details on the usage of
enforcedIKEv2PolicyProfileID configuration parameter, see
the section Management of Node IPsec Certificate and Trust
Distribution Use Cases in Case of Multiple Ikev2PolicyProfile
MOs on page 449.
Results
Node Name Enroll State Enroll Error Subject Serial Number Issuer Subject
Message Alternative
Name
LTE03ERBS01 IDLE Not Applicable CN=LTE03ERBS01 00A412FF0021 CN=NE_OAM_CA,O Not Applicable
-oam, =ERICSSON,OU=B
O=ERICSSON,OU= UCI_DUAC_NAM,C
BUCI DUAC =SE
NAM,C=SE
Where:
Actors
If input certificate type is IPSec, the actors are as follows:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
1. Acquire the information of all the trust certificates distributed to the nodes.
— The IPsec Trust Get use case is failed if more than one
Ikev2PolicyProfile is present on the node.
— The IPsec Trust Get use case does not list any certificates
if no Ikev2PolicyProfile is found with the matching
Ikev2PolicyProfileId value as given configuration
parameter value.
c. For more details on the usage of
enforcedIKEv2PolicyProfileID configuration parameter, see
the section Management of Node IPsec Certificate and Trust
Distribution Use Cases in Case of Multiple Ikev2PolicyProfile
MOs on page 449.
Results
Node Name Install State Install Error Subject Serial Number Issuer
Message
LTE03ERBS00159 IDLE Not Applicable CN=ENM_OAM_CA,C=S 47103511567742699 CN=ENM_Infrastruc
E,O=ERICSSON,OU=B 4 ture_CA,C=SE,O=ER
UCI_DUAC_NAM ICSSON,OU=BUCI_DU
AC_NAM
Where:
Actors
If input certificate type is IPsec, the actors are as follows:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
— The nodes must exist in the ENM.
Steps
1. Issue a certificate.
After performing enrollment for both SCEP and CMP, if there is IPSEC
certificate on CPP nodes that are configured with IPv6, the following
manual sync command must be used for verification of new certificate as
a workaround option because of bug on CPP node:
Note: For Baseband Radio Nodes, the behavior of the IPsec Certificate
Issue use case with the different enforcedIKEv2PolicyProfileID
configuration values is as follows:
Results
Successfully started a job to issue certificates for nodes.
An entity related to each node is created. It is specific for the node and the input
certificate type and contains the configuration specified in the provided XML file.
If the nodes already had a certificate for the requested certificate type, the
previous one is revoked with reason Unspecified.
Moreover, the entity related to each node is updated with the new configuration
specified in the provided XML file.
To verify if the new certificate has been successfully issued for the node, run the
ENM CLI command:
Note: If the certificate issue/reissue job is successful, then node has the new
certificate. If the node is in SL2, newly installed certificate details are not
listed immediately in the ENM, but this does not have any impact on the
dependent use cases.
neCertAutoRenewalTimer
indicates the number of days before the expiry of the
node certificate in which the service is automatically
renewed.
neCertAutoRenewalEnabled
It is a BOOLEAN flag to enable or disable the auto-
renewal feature about node certificates.
neCertAutoRenewalMax
Indicates the maximum number of expired
nodes certificate for renewal at each round. If
neCertAutoRenewalMax < 0, all expired node certificates
are renewed.
The parameters are configured with the default values when the security service
group (secserv) started.
For details on how to view and modify configuration parameters, see View and
Modify Configuration Parameters on page 12.
Table 10
Description CONFIGURATION PARAMETER Default Value
Timer for Auto-renewal neCertAutoRenewalTimer 30
Enable of Auto-renewal neCertAutoRenewalEnabled true
Warnings for Auto-renewal neCertAutoRenewalMax 100
This command cannot be executed if the node does not have a certificate yet.
In this case, to enroll a node, execute ENM CLI command secadm certificate
issue.
Actors
If input certificate type is IPsec, the actors are as follows:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
1. Reissue a certificate.
Note: For Baseband Radio Nodes, the behavior of the IPsec Certificate
Reissue use case with the different enforcedIKEv2PolicyProfileID
configuration values is as follows:
Results
Successfully started a job to reissue certificates for nodes.
The previous nodes certificate is revoked with the input reason if specified, or
'reason unspecified' otherwise.
To verify if the new certificate has been issued for the node successfully, run the
ENM CLI command:
Note: If the certificate issue/reissue job is successful, then the node has the
new certificate. If the node is in SL2, newly installed certificate details
are not listed immediately in the ENM, but this does not have any impact
on the dependent use cases.
For Baseband Radio Nodes, the behavior of the IPsec Certificate Get
use case with the different enforcedIKEv2PolicyProfileID configuration
parameter values is as follows:
— The IPsec Certificate Issue Get use case is failed if more than
one Ikev2PolicyProfile is present on the node.
— The IPsec Certificate Get use case does not list any
certificates if no Ikev2PolicyProfile MO is found with the
matching Ikev2PolicyProfileId value as given configuration
parameter value.
3. For more details on the usage of enforcedIKEv2PolicyProfileID
configuration parameter, see the section Management of Node
IPsec Certificate and Trust Distribution Use Cases in Case of
Multiple Ikev2PolicyProfile MOs on page 449.
Actors
If input certificate type is IPsec, the actors are as follows:
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Remove the trust certificate from the nodes using the ENM CLI command:
Note: In future, the CertType option is deprecated. When the user executes
this command with CertType option, a warning message is provided as
the command with --certtype option will be deprecated in
future but the action will contnue, use --trustcategory,
instead of --certtype.
For Baseband Radio Nodes, the behavior of the IPsec Trust Remove
use case with the different enforcedIKEv2PolicyProfileID configuration
parameter values is as follows:
— The IPsec Trust Remove use case is failed if more than one
Ikev2PolicyProfile is present on the node.
— The IPsec Trust Remove use case does not remove any Trusted
certificates if no Ikev2PolicyProfile MO is found with the
matching Ikev2PolicyProfileId value as given configuration
parameter value.
3. For more details on the usage of enforcedIKEv2PolicyProfileID
configuration parameter, see the section Management of Node
IPsec Certificate and Trust Distribution Use Cases in Case of
Multiple Ikev2PolicyProfile MOs on page 449.
Results
A job is successfully started for trust removal from nodes.
To verify if the trust certificate has been removed successfully, run the ENM CLI
command secadm trust get.
The enrollment is made by ENM PKI. ENM PKI uses two enrollment protocols:
SCEP and CMPv2.
Example: For MSC nodes with OAM enrollment to primary ENM, run the
steps described in the section Add ENM CAs to MSC Node (MSC-BC-BSP,
MSC-BC-IS, MSC-DB, and MSC-DB-BSP) on page 94 for downloading
and installing the CA certificates of Secondary ENM on to node. Similar
steps must be executed for different node types and enrollment types.
SCEP
SCEP protocol is used to enroll certificate for End Entity or node. When the
certificate is reissued using SCEP, operator needs to revoke the old certificate
manually.
Note: Operator needs to revoke the old certificate only after the confirmation
that the new certificate is successfully installed on the node.
CMPv2
CMPv2 is a PKI protocol used for certificate enrollment of End Entity (EE).
It can be used to perform initial enrollment and renew (key update) operations.
Through initial enrollment, an EE gets its own certificate and sets trusted
certificates. Renew (key update) can be used to renew the existing certificate.
The protocol works by exchanging signed messages back and forth between the
EE and the Registration Authority (RA) or Certificate Authority (CA) until the
issue of certificate is received by the EE.
IAK authentication is achieved by the PKI (CA or RA) issuing the EE with
a IAK and reference value (used to identify the secret value) through some
out-of-band means. Then, the IAK is used by the EE to sign digitally the
CMPv2 message.
Considerations
2. When user initiates enrollment protocol, the user must consider that if
node uses any weak algorithm, it needs to be enabled in the PKI system.
By default, weak algorithms are disabled in the system. The user needs
to use pkiadm commands of ENM CLI to enable the same. See the
section Configuration Management Tasks in the document ENM Public Key
Infrastructure System Administrator Guide, Reference [8].
Example:
The operator has to generate the node credential and trusted credentials
manually, and install them on the node, in an offline manner.
The procedure described here is applicable for OAM Enrollment only. Do not use
it for IPsec Enrollment.
Overview
The offline procedure is based on three main steps:
At the end of the procedure, the Radio Node is added in ENM and in SYNC with
TLS.
6.8.2.1 End Entity Creation and Credential Generation for E2E Offline Enrollment for
Baseband Radio Node
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials, each End Entity is mapped to an Entity Profile (EP) that
defines the Certificate Authority (CA).
For information about Entity and Profiles, see Public Key Infrastructure System
of the document ENM Public Key Infrastructure System Administrator Guide,
Reference [8].
Prerequisites
Steps
The highlighted profile is the default profile used when OAM Enrollment is
performed for Radio Nodes.
The End Entities are created from an XML file. The template for the XML is
the following:
Template.xml
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Radio Node is added in ENM.
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Radio Node is added in ENM.
The file is an example of the XML used to generate the End Entity for the
RadioNode with Network Element ID=G2RBS_27.
EE-G2RBS_27-oam.xml
The End Entity is created, with name Network Element ID-oam, and its
status is NEW. The following example shows an End Entity related to Radio
Node G2RBS_27.
Example
— ENM_OAM_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
6.8.2.2 LDAP Configuration for E2E Offline Enrollment for Baseband Radio Node
Prerequisites
Steps
Example
Command output:
With the following indications, collect the value for each MO Attribute listed
in the first column:
6.8.2.3 Node Configuration for E2E Offline Enrollment for Baseband Radio Node
Prerequisites
Steps
PEM files provided at Step 7 in Section 6.8.2.1 of the document End Entity
Creation and Credential Generation for E2E Offline Enrollment for Baseband
Radio Node.
3. Configure LDAP.
Described in step 2 of: LDAP Configuration for E2E Offline Enrollment for
Baseband Radio Node on page 64
The operator starts the node enrollment through the CMPv2 protocol, obtaining
certificate from PKI-RA.
This procedure is only applicable for OAM Enrollment. Do not use for IPsec
Enrollment.
Overview
The online procedure is based on three main steps:
— End Entity creation and Credential generation from ENM.
— Node configuration.
At the end of the procedure, the Radio Node is added in ENM and is synchronized
with TLS.
6.8.3.1 End Entity Creation and Credential Generation for Online Certificate Enrollment
on RadioNode
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) which
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Prerequisites
Steps
The highlighted profile is the default profile used when OAM Enrollment is
performed for Radio Nodes.
The End Entities are created starting from an XML file. The following is the
template for the XML file:
Template.xml
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Radio Node is added in ENM.
The following file is an example of XML file used to generate the End
Entity for the RadioNode with Network Element ID=G2RBS_27.
EE-G2RBS_27-oam.xml
Example
EE Subject DN:
CN=<EntityInfo.Subject.COMMON_NAME.value>,C=<EntityInfo.Subject.COUNTRY_NAME →
.value>,O=<EntityInfo.Subject.ORGANIZATION.value>,OU=<EntityInfo.Subject.ORG →
ANIZATION_UNIT.value>,
EE Subject DN:
CN=G2RBS_27-oam,C=SE,O=ERICSSON,OU=BUCI DUAC NAM
If ENM_PKI_Root_CA is self-signed:
>pkiadm extcalist
From this table, it is possible to retrieve the ExtRoot CA. For example, if from
step b the ENM_PKI_Root_CA has been signed by O=TCS, C=IN, OU=DLF,
CN=PrimeTowerIntermediateCA, then the ExtRoot CA name is O=TCS,
C=IN, OU=DLF, CN=PrimeTowerRootCA - Retrieve ExtCA Certificate
From WebCLI:
Connectivity
Prerequisites
Steps
Following the indications reported in the following, collect the value for each
MO Attribute listed in the first column:
Prerequisites
Node credential and LDAP must be configured on the Radio Node by following
these steps.
Steps
a. EnrollmentAuthority MO:
Example
enrollmentCaFingerprint=57 :FD:2A: 59 : 36 :D5: 18 : 76 : 34 :4D:FB →
:B7: 98 :FC:5B: 15 :BF: 68 : 19 :E8
enrollmentAuthorityName="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=NE_OAM →
_CA"
b. EnrollmentServer MO:
Example
in case Node is configured with IPv4:
uri=http://141.137.211.135:8091/pkira-cmp/NE_OAM_CA/synch
Example
In case Node is configured with IPv6:
uri=http://[2001:1b70:82a1:138:0:2313:5249:4a]:8091/pkira-cmp/NE_OA →
M_CA/synch
c. NodeCredential MO:
Example
SubjectName=CN=G2RBS_27-oam,C=SE,O=ERICSSON,OU=BUCI DUAC NAM
2. Configure LDAP:
Described in Configure LDAP:
Prerequisites
— LDAP user must be created using User Management application with few
important roles mentioned in Step 18.
— Added ENM CAs to MSC node: see the section Add ENM CAs to MSC Node
(MSC-BC-BSP, MSC-BC-IS, MSC-DB, and MSC-DB-BSP) on page 94 to do
this action.
— For MSC-BC-BSP node which consists of dual AP, install the certs on both
AP1 and AP2. If AP2 is chosen which is optional, then install the certs from
ENM.
Steps
— Node configuration.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System and use it for communication with other ENM systems. EEs
must be created in the PKI system.
For more information about Entity and Profiles, see the section Concepts of the
document ENM Public Key Infrastructure System Administrator Guide, Reference
[8].
Figure 3
For more information about Entity and Profiles, see the section ENM
PKI Concepts of the document ENM Public Key Infrastructure System
Administrator Guide, Reference [8]. The highlighted profile is the default
profile used when OAM Enrollment is performed for MSC nodes.
The EEs are created starting from an *.xml file. The template for the *.xml
file is the following:
<?xml version="1.0"?>
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamesp →
aceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCIDUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson01</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure, when the MSC node is added in ENM.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the MSC node is added in ENM.
Save the created XML file. The suggested name for the file is
EE_<Network Element ID>-oam.xml.
The EE must be created with name <Network Element ID-oam> and its
status is NEW. In the following example, the EE is related to <MSC Node
NE_NAME>:
Figure 4
Node Configuration: it describes the configuration of the Node Credential MO
in the MSC.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
Example
The example shows one NodeCredential on the Node.
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
TrustedCertificate=2
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1) >Configure
(config-CertM=1)>NodeCredential=1
b. Execute the commit command to save the changes after the node
credentials are created.
(config-NodeCredentail=1)>commit
(CertM=1)>EnrollmentAuthority=1
(EnrollmentAuthority=1)>show -v
EnrollmentAuthority=1
authorityType=REGISTRATION_AUTHORITY
enrollmentAuthorityName="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=NE_ →
OAM_CA"
enrollmentCaCertificate="ManagedElement=MSCSRV054AP1,SystemFunct →
ions=1,SecM=1,CertM=1,TrustedCertificate=16"
(EnrollmentServer=1)>
(CertM=1)>EnrollmentAuthority=1(EnrollmentServerGroup=1)>show -v
EnrollmentServerGroup=1
enrollmentServerGroupId="1"
userLabel=[] <empty>
EnrollmentServer=1
(EnrollmentServerGroup=1)>EnrollmentServer=1
(EnrollmentServer=1)>show -v
EnrollmentServer=1
enrollmentAuthority="ManagedElement=MSCSRV054AP1,SystemFunctions →
=1,SecM=1,CertM=1,EnrollmentAuthority=1" <deprecated>
enrollmentServerId="1"
protocol=CMP
uri="http://131.160.146.36:8091/pkira-cmp/NE_OAM_CA/synch"
userLabel=[] <empty>
(EnrollmentServer=1)>
e. Install trust certs for ENM_PKI_Root_CA at least and for MSC it needs
ENM_PKI_Root_CA like other ECIM/COM nodes.
OR
(TrustedCertificate=16)>show -v
TrustedCertificate=16
certificateState=VALID <read-only>
managedState=ENABLED <default>
reservedByCategory <read-only>
"ManagedElement=MSCSRV054AP1,SystemFunctions=1,SecM=1,CertM=1 →
,TrustCategory=1"
trustedCertificateId="16"
certificateContent="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_ →
Root_CA" <read-only>
extensionContent <read-only>
"X509v3 Basic Constraints:CA:TRUE"
"X509v3 Key Usage:Certificate Sign, CRL Sign"
"X509v3 Subject Key Identifier:BD:A9:63:BE:13:5F:7F:36:A7: →
44:83:CE:46:4A:75:76:24:AF:F3:AB"
issuer="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_Root_CA" →
<read-only>
keyUsage="Certificate Sign, CRL Sign" <read-only>
publicKey="E7:85:6D:3F:B0:35:95:46:D2:07:5D:36:19:36:18:30:BA →
:8D:01:A2:8E:93:CA:42:0D:3B:88:AD:C4:08:B4:4B:2A:AE:BF:0E:6A:24:F5: →
B7:4D:96:E6:4D:59:36:E4:7F:5F:0E:F6:30:87:4A:54:63:48:EC:4F:06:6B:5 →
A:F1:FB:F2:CA:AC:D0:AE:D9:14:DF:86:8C:D8:86:08:1C:34:70:21:01:A9:36 →
:05:D0:20:88:C0:F9:B1:D0:BC:85:89:94:1B:E7:76:65:01:90:D3:9C:21:F3: →
BD:D8:CB:A6:C6:89:57:21:34:EA:17:DD:ED:5B:C8:6D:64:8E:EB:DB:CD:F6:4 →
A:77:84:25:FA:EB:B3:1C:D5:00:3C:46:40:8A:4F:E3:9C:58:0E:A9:A7:DB:AB →
:7A:F8:A5:46:83:6B:94:CA:EA:90:BF:D6:37:2D:E6:ED:C8:FF:B8:6E:D5:6F: →
BE:E0:93:9F:FF:5E:BD:C3:55:91:78:18:D4:F1:DE:8B:F6:63:FC:1F:B2:F5:4 →
7:6D:D4:80:05:8E:CE:62:63:15:A8:C5:1A:1B:C6:88:4C:3F:32:5A:AC:E8:41 →
:07:29:94:73:02:C3:73:7C:63:16:0D:18:00:01:C3:3D:7C:C8:8D:61:82:0B: →
31:F3:C7:3F:A6:1C:AE:3E:13:17:9F:04:54:E6:D5:8B" <read-only>
publicKeyAlgorithm="RSA" <read-only>
serialNumber="64:1E:23:68:D4:8E:74:D4" <read-only>
signatureAlgorithm="sha256WithRSAEncryption" <read-only>
subject="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_Root_CA →
" <key> <read-only>
validFrom="2018-01-03T20:43:20Z" <read-only>
validTo="2028-01-03T20:43:20Z" <read-only>
version="Version 3" <read-only>
CertM=1)>EnrollmentServerGroup=1
(EnrollmentServerGroup=1)>show -v
EnrollmentServerGroup=1
enrollmentServerGroupId="1"
userLabel=[] <empty>
EnrollmentServer=1
(EnrollmentServerGroup=1)>EnrollmentServer=1
(EnrollmentServer=1)>show -v
EnrollmentServer=1
enrollmentAuthority="ManagedElement=MSCSRV054AP1,SystemFunctions →
=1,SecM=1,CertM=1,EnrollmentAuthority=1" <deprecated>
enrollmentServerId="1"
protocol=CMP
uri="http://131.160.146.36:8091/pkira-cmp/NE_OAM_CA/synch"
userLabel=[] <empty>
(EnrollmentServer=1)>
Note: <OTP set for the PKI entity created> is the One-
Time-Password (OTP) for the PKI End Entity created
(during Step 4) through PKI Management GUI.
ManagedElement =<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1 →
,LdapAuthenticationMethod=1,Ldap=1
LdapAuthenticationMethod=1)>show
LdapAuthenticationMethod=1
administrativeState=UNLOCKED
Ldap=1
(Ldap=1)>configure
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunc →
tions=1,SecM=1,CertM=1,NodeCredential=2
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn="dc=ieatlms5589,dc=com"
bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e3,ou →
=proxyagent,ou=com,dc=ieatlms5223,dc=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="131.160.129.59"
ldapId="1"
ldapIpAddress="131.160.129.60"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,Cer →
tM=1,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
13. Navigate to the <Ldap=1> MO of the node by tabbing out each comma-
separated MO
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
14. Configure the LDAP MO details as described in the following using values
retrieved from Step 10.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5223,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e →
3,ou=proxyagent,ou=com,dc=ieatlms5223,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.128.123"
(config-Ldap=1)>ldapIpAddress="131.160.128.124"
(config-Ldap=1)>bindPassword=”TLnH6ywUvNHWrAvdeHzZzswS" cleartext
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,S →
ecM=1,CertM=1,NodeCredential=2"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn=" dc=ieatlms5223,dc=com"
bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e3,ou=proxyage →
nt,ou=com,dc=ieatlms5223,dc=com"
bindPassword="1:36OpqTK3HCo9zjV46dm1HmnQcIrXImn"
fallbackLdapIpAddress="131.160.128.123"
ldapId="1"
ldapIpAddress="131.160.128.124"
nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1 →
,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
tlsMode=LDAPS
trustCategory="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1, →
TrustCategory=2"
useReferrals=false <default>
userLabel="LDAP based login authentication"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
(Ldap=1)>show -v
Ldap=1
baseDn="dc=oss123,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="10.23.34.57"
ldapId="1"
ldapIpAddress="10.23.34.56"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,CertM=1,Node →
Credential=2"
profileFilter=ERICSSON_FILTER
serverPort=1636
(Ldap=1)>configure
(Config-Ldap=1)serverPort=1636
(Config-Ldap=1)>commit
>ManagedElement=MSCSRV054AP1,SystemFunctions=1,AxeFunctions=1,SecurityHandli →
ng=1,MmlAuthorizationM=1
(MmlAuthorizationM=1)>show -v
MmlAuthorizationM=1
ignoreCpSuperUserRole=false <default> <read-only>
ignoreCpUserRoles=false <default> <read-only>
mmlAuthorizationMethod=CPUSER
mmlAuthorizationMId="1"
MmlRole=CpRole4
(MmlAuthorizationM=1)>
• SystemAdministrator
• SystemSecurityAdministrator
• EricssonSupport
• CpRole0
For the roles that are applied, ensure that Assign Target Groups is set to
ALL:
Figure 6
Results
ENM LDAP user for MSC is now able to access to MSC node and must have the
roles added in Step 18.
Note: For all the nodes, which support offline enrollment, alarm has to be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
— LDAP user must be created using User Management application with few
important roles mentioned in step Step 17.
— ENM CAs must be added to MSC node: see the section Add ENM CAs to MSC
Node (MSC-BC-BSP, MSC-BC-IS, MSC-DB, and MSC-DB-BSP) on page 94.
Steps
— Node configuration.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System and use it for communication with other ENM systems. EE
must be created in the PKI system.
For more information about entity and profiles, see the section ENM PKI
Concepts of the document ENM Public Key Infrastructure System Administrator
Guide, [8].
2. Check Entity Profile by listing all the Entity Profiles already present in ENM
PKI system:
Sample output:
Figure 7
The highlighted profile is the default profile used when OAM Enrollment is
performed for MSC nodes.
The EEs are created starting from an *.xml file. The template for the *.xml
file is the following (End-Entity.xml):
<?xml version="1.0"?>
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamesp →
aceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCIDUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson03</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
During the XML file creation, the following rules must be applied:
— In the <EntityInfo> tag, the <name> must be <Network Element ID-
oam>.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the MSC node is added in ENM.
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the MSC node is added in ENM.
Figure 8
pkiadm ctm EECert -gen -nocsr -en MSCSRV054AP1-oam -f P12 --password <passwo →
rd>
Note: <password >can be anything and this is only needed for generating
P12 file.
Copy the P12 file to ENM management server in /tmp directory which is
generated in the previous step.
Node Configuration
This section describes the configuration of the node Node Credential MO in the
MSC.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
TrustedCertificate=2
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>Configure
(config-CertM=1)>NodeCredential=1
b. Execute the commit command to save the changes after the node
credentials are created.
(config-NodeCredentail=1)>commit
(NodeCredential=1)>installCredentialFromUri sftp://root@LMS_IP/tmp →
/NE_NAME-oam.p12 <LMS Password> <Password of P12 file> NULL
true
(NodeCredential=1)>show enrollmentProgress
enrollmentProgress
actionId=0
actionName="installCredentialFromUri"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the container file"
state=FINISHED
timeActionCompleted="2017-08-05T12:37:36Z"
timeActionStarted="2017-08-05T12:37:36Z"
timeOfLastStatusUpdate="2017-08-05T12:37:36Z"
(NodeCredential=1)>
Note: The password of the P12 file is the same password used for
creating P12 file.
ManagedElement =<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1 →
,LdapAuthenticationMethod=1,Ldap=1
LdapAuthenticationMethod=1)>show
LdapAuthenticationMethod=1
administrativeState=UNLOCKED
Ldap=1
(Ldap=1)>configure
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunc →
tions=1,SecM=1,CertM=1,NodeCredential=2
(config-Ldap=1)>trustCategory="ManagedElement=MSCSBC029AP1,SystemFu →
nctions=1,SecM=1,CertM=1,TrustCategory=1"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn="dc=ieatlms5589,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc →
=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="131.160.129.59"
ldapId="1"
ldapIpAddress="131.160.129.60"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1, →
CertM=1,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
tlsMode=LDAPS
trustCategory="ManagedElement=MSCSBC029AP1,SystemFunctions=1,Sec →
M=1,CertM=1,TrustCategory=1"
useReferrals=false <default>
userLabel=[] <empty>
useTls=true
This section describes the procedure to reconfigure LDAP credentials on the MSC
to use ENM LDAP server.
12. Run this command in ENM CLI to retrieve LDAP configuration details:
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
14. Navigate to the <Ldap=1> MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
15. Configure the LDAP MO details using values retrieved from Step 11.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5589,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount_19,ou=proxyagent,ou=com,dc=ieatlms55 →
89,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.129.59"
(config-Ldap=1)>ldapIpAddress="131.160.129.60"
(config-Ldap=1)>bindPassword=”gfu94ncy" cleartext
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,S →
ecM=1,CertM=1,NodeCredential=2"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn=" dc=ieatlms5589,dc=com"
bindDn="cn=ProxyAccount_19,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:36OpqTK3HCo9zjV46dm1HmnQcIrXImn"
fallbackLdapIpAddress="131.160.129.59"
ldapId="1"
ldapIpAddress="131.160.129.60"
nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1 →
,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
tlsMode=LDAPS
trustCategory="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1, →
TrustCategory=2"
useReferrals=false <default>
userLabel="LDAP based login authentication"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
(Ldap=1)>show -v
Ldap=1
baseDn="dc=oss123,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="10.23.34.57"
ldapId="1"
ldapIpAddress="10.23.34.56"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,CertM=1,Node →
Credential=2"
profileFilter=ERICSSON_FILTER
serverPort=1636
(Ldap=1)>configure
(Config-Ldap=1)serverPort=1636
(Config-Ldap=1)>commit
— SystemAdministrator
— SystemSecurityAdministrator
— EricssonSupport
— CpRole0
For the roles that are applied, ensure that Assign Target Groups is set to ALL:
Figure 9
— SystemSecurityAdministrator.
6.8.5.1 Add ENM CAs to MSC Node (MSC-BC-BSP, MSC-BC-IS, MSC-DB, and MSC-DB-
BSP)
Prerequisites
No prerequisites.
Steps
1. Launch ENM CLI and run the commands to obtain the Trust Distribution
Point Service (TDPS) URL for each of the four required ENM CA certificates.
These certificates are used later to download the ENM CA certificates to the
node.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
5. Execute the show command on the CertM MO to display the installed trusted
certificates on the node.
Navigate to TrustCategory and execute the show command to verify if all the
certificates are added.
Prerequisites
Steps
— Node configuration.
End Entities of the PKI System are the end users who get credentials from the
ENM PKI System and use it for communication with other ENM systems. End
Entities must be created in the PKI system. Root access privileges are required to
log on the management server and the VMs.
For more information about Entity and Profiles, see the section ENM PKI
Concepts of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Sample output:
Figure 10
The highlighted profile is the default profile used when OAM Enrollment is
performed for HLR-FE Nodes.
The EEs are created from an XML file. The template for the XML file is the
following:
<?xml version="1.0"?>
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamesp →
aceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCIDUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson03</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
During the XML file creation, the following rules must be applied:
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure, when the HLR-FE node is added in ENM.
The NetworkElementID is the identifier that the user must use at the
end of this procedure, when the HLR-FE node is added in ENM.
Save the created XML file. The suggested name for the file is
EE_Network Element ID-oam.xml.
The End Entity must be created with name <Network Element ID-oam>
and its status is NEW. In the example, there is the End Entity related to
<HLR-FE Node NE_NAME>:
Figure 11
Node Configuration
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
TrustedCertificate=2
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(config-CertM=1)>NodeCredential=1(config-NodeCredential=1)>enrollme →
ntAuthority="ManagedElement=SELIITHLR00008,SystemFunctions=1,SecM=1 →
,CertM=1,EnrollmentAuthority=1"
(config-NodeCredential=1)>enrollmentServerGroup="ManagedElement=SEL →
IITHLR00008,SystemFunctions=1,SecM=1,CertM=1,EnrollmentServerGroup= →
1"
(config-NodeCredential=1)>keyInfo=RSA_2048
(config-NodeCredential=1)>renewalMode=MANUAL/AUTOMATIC
(config-NodeCredential=1)>subjectName="CN=MSCSRV054AP1-oam,C=SE,O=E →
RICSSON,OU=BUCI DUAC NAM"
(config-NodeCredential=1)>commit
(NodeCredential=1)>
(CertM=1)>EnrollmentAuthority=1
(EnrollmentAuthority=1)>show -v
EnrollmentAuthority=1
authorityType=REGISTRATION_AUTHORITY
enrollmentAuthorityName="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=NE_ →
OAM_CA"
enrollmentCaCertificate="ManagedElement=SELIITHLR00008,SystemFun →
ctions=1,SecM=1,CertM=1,TrustedCertificate=16"
(EnrollmentServer=1)>
Launch the ENM CLI. Run the following commands, to obtain the
Trust Distribution Point Service (TDPS) URL for each of the required
ENM and NE CA certificates. There are used to download the ENM
and NE CA certificates to the node.
(TrustedCertificate=16)>show -v
TrustedCertificate=16
certificateState=VALID <read-only>
managedState=ENABLED <default>
reservedByCategory <read-only>
"ManagedElement=SELIITHLR00008,SystemFunctions=1,SecM=1,CertM →
=1,TrustCategory=1"
trustedCertificateId="16"
certificateContent="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_ →
Root_CA" <read-only>
extensionContent <read-only>
"X509v3 Basic Constraints:CA:TRUE"
"X509v3 Key Usage:Certificate Sign, CRL Sign"
"X509v3 Subject Key Identifier:BD:A9:63:BE:13:5F:7F:36:A7: →
44:83:CE:46:4A:75:76:24:AF:F3:AB"
issuer="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_Root_CA" →
<read-only>
keyUsage="Certificate Sign, CRL Sign" <read-only>
publicKey="E7:85:6D:3F:B0:35:95:46:D2:07:5D:36:19:36:18:30:BA →
:8D:01:A2:8E:93:CA:42:0D:3B:88:AD:C4:08:B4:4B:2A:AE:BF:0E:6A:24:F5: →
B7:4D:96:E6:4D:59:36:E4:7F:5F:0E:F6:30:87:4A:54:63:48:EC:4F:06:6B:5 →
A:F1:FB:F2:CA:AC:D0:AE:D9:14:DF:86:8C:D8:86:08:1C:34:70:21:01:A9:36 →
:05:D0:20:88:C0:F9:B1:D0:BC:85:89:94:1B:E7:76:65:01:90:D3:9C:21:F3: →
BD:D8:CB:A6:C6:89:57:21:34:EA:17:DD:ED:5B:C8:6D:64:8E:EB:DB:CD:F6:4 →
A:77:84:25:FA:EB:B3:1C:D5:00:3C:46:40:8A:4F:E3:9C:58:0E:A9:A7:DB:AB →
:7A:F8:A5:46:83:6B:94:CA:EA:90:BF:D6:37:2D:E6:ED:C8:FF:B8:6E:D5:6F: →
BE:E0:93:9F:FF:5E:BD:C3:55:91:78:18:D4:F1:DE:8B:F6:63:FC:1F:B2:F5:4 →
7:6D:D4:80:05:8E:CE:62:63:15:A8:C5:1A:1B:C6:88:4C:3F:32:5A:AC:E8:41 →
:07:29:94:73:02:C3:73:7C:63:16:0D:18:00:01:C3:3D:7C:C8:8D:61:82:0B: →
31:F3:C7:3F:A6:1C:AE:3E:13:17:9F:04:54:E6:D5:8B" <read-only>
publicKeyAlgorithm="RSA" <read-only>
serialNumber="64:1E:23:68:D4:8E:74:D4" <read-only>
signatureAlgorithm="sha256WithRSAEncryption" <read-only>
subject="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=ENM_PKI_Root_CA →
" <key> <read-only>
validFrom="2018-01-03T20:43:20Z" <read-only>
validTo="2028-01-03T20:43:20Z" <read-only>
version="Version 3" <read-only>
CertM=1)>EnrollmentServerGroup=1
(EnrollmentServerGroup=1)>show -v
EnrollmentServerGroup=1
enrollmentServerGroupId="1"
userLabel=[] <empty>
EnrollmentServer=1
(EnrollmentServerGroup=1)>EnrollmentServer=1
(EnrollmentServer=1)>show -v
EnrollmentServer=1
enrollmentAuthority="ManagedElement=SELIITHLR00008,SystemFunctio →
ns=1,SecM=1,CertM=1,EnrollmentAuthority=1" <deprecated>
enrollmentServerId="1"
protocol=CMP
uri="http://131.160.146.36:8091/pkira-cmp/NE_OAM_CA/synch"
userLabel=[] <empty>
(EnrollmentServer=1)>
A7:5F:99:51:05:EB:2B:E2:55:D2:13"
issuer="OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=NE_OAM_CA" <read- →
only>
keyUsage="Digital Signature, Key Encipherment, Key Agreement →
" <read-only>
publicKey="D7:60:87:EE:CF:17:4E:6A:9E:16:02:76:7B:BF:FF:5B:8D →
:E6:77:0C:86:13:70:AD:9C:E4:B5:B2:7F:4C:D7:62:69:69:79:75:EB:6E:EC: →
BE:97:1D:C6:E1:00:DD:57:5F:A6:98:5E:29:52:7F:64:3C:E5:99:72:37:D3:5 →
A:FE:1C:45:1D:48:99:BC:67:6F:39:C7:9C:AE:94:43:D4:B2:9A:EC:E4:3C:4C →
:C4:DA:99:3C:FB:4E:03:CB:B0:C6:C2:DE:EC:B6:53:47:F1:0A:54:EE:CA:A3: →
F9:81:3C:F5:8D:13:E9:71:67:CA:BF:C2:E4:0B:4C:3A:17:37:D3:7D:B7:F0:3 →
8:30:2E:4C:45:F1:F8:EC:1E:1D:6E:B9:3E:F4:95:80:3B:4A:A7:5E:41:41:D3 →
:4C:D8:3F:7B:A0:02:FC:E8:13:A2:DF:50:6F:70:D3:28:19:E0:86:69:C9:EF: →
EB:1E:41:74:F7:6F:3F:83:C2:24:F2:BD:64:13:11:1C:B0:20:ED:62:C3:AB:E →
9:53:72:DF:4E:F3:81:87:F9:39:B9:83:5A:AB:AF:97:3D:E0:4B:10:08:00:4C →
:4B:EB:D5:84:29:17:96:DC:F0:1D:20:4B:54:27:C9:B9:C9:D3:B6:5A:38:C5: →
E3:AB:DD:76:19:0E:7A:69:BC:B7:69:C4:46:FC:82:85" <read-only>
publicKeyAlgorithm="RSA" <read-only>
serialNumber="5A:EB:75:C0:65:03:65:B3" <read-only>
signatureAlgorithm="sha256WithRSAEncryption" <read-only>
subject="OU=BUCI DUAC NAM,O=ERICSSON,C=SE,CN=SELIITHLR00008-o →
am" <key> <read-only>
validFrom="2018-01-12T07:29:18Z" <read-only>
validTo="2020-01-12T07:29:18Z" <read-only>
version="Version 3" <read-only>
enrollmentProgress <read-only>
actionId=0 <read-only>
actionName="startOnlineEnrollment" <read-only>
additionalInfo=[] <empty> <read-only>
progressInfo="" <read-only>
progressPercentage=100 <read-only>
result=SUCCESS <read-only>
resultInfo="installed from the online service" <read-only>
state=FINISHED <read-only>
timeActionCompleted="2018-01-12T07:59:24Z" <read-only>
timeActionStarted="2018-01-12T07:59:23Z" <read-only>
timeOfLastStatusUpdate="2018-01-12T07:59:24Z"
(NodeCredential=1)>
Note: <OTP set for the PKI entity created> is the One-
Time-Password (OTP) for the PKI End Entity created
(during step 4) through PKI Management GUI.
show enrolmentProgress.
ManagedElement =<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1 →
,LdapAuthenticationMethod=1,Ldap=1
(Ldap=1)>configure
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunc →
tions=1,SecM=1,CertM=1,NodeCredential=2
(config-Ldap=1)>trustCategory="ManagedElement=<NE_NAME>,SystemFunct →
ions=1,SecM=1,CertM=1,TrustCategory=2"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn="dc=ieatlms5589,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc=co →
m"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="131.160.129.59"
ldapId="1"
ldapIpAddress="131.160.129.60"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,Cer →
tM=1,NodeCredential=2"
trustCategory="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,Ce →
rtM=1,TrustCategory=2"
profileFilter=ERICSSON_FILTER
serverPort=636
11. Run the command in ENM CLI to retrieve LDAP configuration details:
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
13. Navigate to the <Ldap=1> MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
14. Configure the LDAP MO details as described using values retrieved from Step
10.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5223,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e →
3,ou=proxyagent,ou=com,dc=ieatlms5223,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.128.123"
(config-Ldap=1)>ldapIpAddress="131.160.128.124"
(config-Ldap=1)>bindPassword=”TLnH6ywUvNHWrAvdeHzZzswS" cleartext
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,S →
ecM=1,CertM=1,NodeCredential=2"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn=" dc=ieatlms5223,dc=com"
bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e3,ou=proxyage →
nt,ou=com,dc=ieatlms5223,dc=com"
bindPassword="1:36OpqTK3HCo9zjV46dm1HmnQcIrXImn"
fallbackLdapIpAddress="131.160.128.123"
ldapId="1"
ldapIpAddress="131.160.128.124"
nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1 →
,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
tlsMode=LDAPS
trustCategory="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1, →
TrustCategory=2"
useReferrals=false <default>
userLabel="LDAP based login authentication"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
(Ldap=1)>show -v
Ldap=1
baseDn="dc=oss123,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="10.23.34.57"
ldapId="1"
ldapIpAddress="10.23.34.56"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,CertM=1,Node →
Credential=2"
profileFilter=ERICSSON_FILTER
serverPort=1636
(Ldap=1)>configure
(Config-Ldap=1)serverPort=1636
(Config-Ldap=1)>commit
— SystemAdministrator
— SystemSecurityAdministrator
— EricssonSupport
— CpRole0
For the roles that are applied, ensure that Assign Target Groups is set to ALL:
Figure 13
Results
ENM LDAP user for HLR-FE is now able to access HLR-FE node. The LDAP user
must have the roles added in the procedure.
Note: For all the nodes, which support offline enrollment, alarm has to be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
— LDAP user must be created using User Management application with few
important roles mentioned in Step 17.
— ENM CAs must be added to HLR-FE node: see the section Add ENM CAs to
HLR-FE Node on page 114.
Steps
— Node configuration.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System and use it for communication with other ENM systems. End
Entity must be created in the PKI system.
For more information about entity and profiles, see the section ENM PKI
Concepts of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Output example:
Figure 14
The highlighted profile is the default profile used when OAM Enrollment is
performed for HLR-FE nodes.
The End Entities are created starting from an XML file. The template for the
XML file is the following:
<?xml version="1.0"?>
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamesp →
aceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCIDUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson04</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
During the XML file creation, the following rules must be applied.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the HLR-FE node is added in ENM.
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the HLR-FE node is added in ENM.
Note: Values for these XML fields can be fetched from the ENM Site
Engineering Document. Security Reference List on page 459.
The End Entity must be created with name <Network Element ID-oam>
and its status is NEW. In the example, there is the End Entity related to<
HLR-FE Node NE_NAME>:
Figure 15
pkiadm ctm EECert -gen -nocsr -en testingHLR-FE01-oam -f P12 --password <pas →
sword>
Note: <password> can be anything and this is only needed for generating
P12 file.
Copy the P12 file to ENM management server in /tmp directory which is
generated in above step.
Node Configuration
It describes the configuration of the Node Credential MO in the BSC, MSC, and
HLR-FE.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
TrustedCertificate=2
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1,NodeCrede →
ntial=1
(NodeCredential=1)>installCredentialFromUri sftp://root@LMS_IP/tmp →
/NE_NAME-oam.p12 <LMS Password> <Password of P12 file> NULL
true
(NodeCredential=1)>show enrollmentProgress
enrollmentProgress
actionId=0
actionName="installCredentialFromUri"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the container file"
state=FINISHED
timeActionCompleted="2017-08-05T12:37:36Z"
timeActionStarted="2017-08-05T12:37:36Z"
timeOfLastStatusUpdate="2017-08-05T12:37:36Z"
(NodeCredential=1)>
or
The new node credential has to be first uploaded on the node file
system, in the folder /certificates:
Note: The password of the P12 file is the same password used for
creating P12 file.
ManagedElement =<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1 →
,LdapAuthenticationMethod=1,Ldap=1
LdapAuthenticationMethod=1)>show
LdapAuthenticationMethod=1
administrativeState=UNLOCKED
Ldap=1
>dn -m Ldap
ManagedElement=CEMSS07,SystemFunctions=1,SecM=1,UserManagement=1,Ld →
apAuthenticationMethod=1,Ldap=
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=example,dc=com"
(config-Ldap=1)>bindDn="cn=comproxy,ou=proxyagent,ou=com,dc=example →
,dc=com"
(config-Ldap=1)>bindPassword=Password cleartext
(config-Ldap=1)>ldapIpAddress=10.44.77.13
(config-Ldap=1)>fallbackldapIpAddress=10.44.77.16
(config-Ldap=1)>useReferrals=true
(config-Ldap=1)>trustCategory="ManagedElement=SELIITHLR00008,System →
Functions=1,SecM=1,CertM=1,TrustCategory=1"
(config-Ldap=1)>nodeCredential="ManagedElement=SELIITHLR00008,Syste →
mFunctions=1,SecM=1,CertM=1,NodeCredential=2"
(config-Ldap=1)>EricssonFilter=1
(config-EricssonFilter=1)>roleAliasesBaseDn="ou=rolealias,ou=com,dc →
=example,dc=com"
(config-EricssonFilter=1)>version=2
(config-EricssonFilter=1)>up
(config-Ldap=1)>up
(config-LdapAuthenticationMethod=1)>up
(config-UserManagement=1)>targetType="SELIITHLR00008,BSC,London"
(config-UserManagement=1)>LdapAuthenticationMethod=1
(config-LdapAuthenticationMethod=1)>administrativeState=UNLOCKED
(config-UserManagement=1)>commit
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
14. Navigate to the <Ldap=1> MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
15. Configure the LDAP MO details as described using values retrieved from Step
1.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5589,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount_19,ou=proxyagent,ou=com,dc=ieatlms55 →
89,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.129.59"
(config-Ldap=1)>ldapIpAddress="131.160.129.60"
(config-Ldap=1)>bindPassword=”gfu94ncy" cleartext
(config-Ldap=1)>nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,S →
ecM=1,CertM=1,NodeCredential=2"
(config-Ldap=1)>commit
(Ldap=1)>show -v
Ldap=1
baseDn=" dc=ieatlms5589,dc=com"
bindDn="cn=ProxyAccount_19,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:36OpqTK3HCo9zjV46dm1HmnQcIrXImn"
fallbackLdapIpAddress="131.160.129.59"
ldapId="1"
ldapIpAddress="131.160.129.60"
nodeCredential="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1 →
,NodeCredential=2"
profileFilter=ERICSSON_FILTER
serverPort=636
tlsMode=LDAPS
trustCategory="ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1, →
TrustCategory=2"
useReferrals=false <default>
userLabel="LDAP based login authentication"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
(Ldap=1)>show -v
Ldap=1
baseDn="dc=oss123,dc=com"
bindDn="cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=ieatlms5589,dc=com"
bindPassword="1:EG5ukQoVKgSBjFCDM7AgwFAgpThShQGm"
fallbackLdapIpAddress="10.23.34.57"
ldapId="1"
ldapIpAddress="10.23.34.56"
nodeCredential="ManagedElement=NE_NAME,SystemFunctions=1,SecM=1,CertM=1,Node →
Credential=2"
profileFilter=ERICSSON_FILTER
serverPort=1636
(Ldap=1)>configure
(Config-Ldap=1)serverPort=1636
(Config-Ldap=1)>commit
>ManagedElement=SELIITHLR00008,SystemFunctions=1,AxeFunctions=1,SecurityHand →
ling=1,MmlAuthorizationM=1
(MmlAuthorizationM=1)>show -v
MmlAuthorizationM=1
ignoreCpSuperUserRole=false <default> <read-only>
ignoreCpUserRoles=false <default> <read-only>
mmlAuthorizationMethod=CPUSER
mmlAuthorizationMId="1"
MmlRole=CpRole4
(MmlAuthorizationM=1)>
— SystemAdministrator
— SystemSecurityAdministrator
— EricssonSupport
— SystemReadOnly
— CpRole0
For all the roles that are applied, ensure that Assign Target Groups is set to
ALL:
Figure 16
Results
ENM ldap user for HLR-FE is now able to access HLR-FE node.
Prerequisites
No prerequisites.
Steps
1. Launch ENM CLI and run the commands to obtain the Trust Distribution
Point Service (TDPS) URL for each of the four required ENM CA certificates.
These certificates are used later to download the ENM CA certificates to the
node.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
>configure
(config)>dn -m CertM
ManagedElement=CEMSS07,SystemFunctions=1,SecM=1,CertM=1
(config-CertM=1)>installTrustedCertFromUri cacert.pem NULL NULL
true
(config-CertM=1)>show
localFileStorePath="certificates"
userLabel="Certificate Management"
reportProgress
actionId=0
actionName="installTrustedCertFromUri"
additionalInfo
"TrustedCertificate=1"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the certificate file"
state=FINISHED
(config-CertM=1)>TrustCategory=1
(config-TrustCategory=1)>trustedCertificates="ManagedElement=CEMSS07,Sy →
stemFunctions=1,SecM=1,Cer
(config-TrustCategory=1)>commit -s
5. Execute the show command on the CertM MO to display the installed trusted
certificates on the node.
The two offline enrollment options that ENM PKI for DSC node supports are:
— CSR-Based Offline Enrollment (PKCS#10).
Note: For all the nodes, which support offline enrollment, alarm has to be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
— End Entity (EE) name is defined in the following format:
— For creation of End Entity, see the section Entity Management Tasks of
the document ENM Public Key Infrastructure System Administrator Guide,
Reference [8].
The user must transfer the p12 file to SFTP server to complete the offline
enrollment procedure. See the Node CPI for Offline enrollment procedures,
Reference [16].
Note: After the certificate is installed successfully on the node, for both CSR
and Container-based Offline Enrollment, it is recommended to perform
revocation of old certificate in ENM PKI.
Prerequisites
— LDAP user must be created using User Management application with few
important roles mentioned in Step 7.
Steps
— Node configuration.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System and use it for communication with other ENM systems. End
Entities must be created in the PKI system.
For more information about Entity and Profiles, see the section ENM PKI
Concepts of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Example
In the example, the highlighted profiles must be available in the command
output.
Figure 17
The highlighted profile is the default profile used when OAM Enrollment is
performed for BSC nodes.
Note: [8PKI End Entity creation can be referred either from Step 3 or Step
4.
The Es are created starting from an XML file. The template for the XML file is
the following:
<?xml version="1.0"?>
<Entities xsi:noNamespaceSchemaLocation="EntitiesSchema.xsd" xmlns:xsi="http →
://www.w3.org/2001/XMLSchema-instance">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson01</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure, when the BSC node is added in ENM.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the MSC node is added in ENM.
— The <OTPCount> tag represents how many times this password can be
used.
Save the created XML file. The suggested name for the file is EE_Network
Element ID-oam.xml.
Drag and drop into the ENM CLI the created XML file and run the following
command to create the End Entity:
The End Entities must be created with name <Network Element ID-oam>
and its status is NEW. In the following example, the End Entity is related to
<BSC Node NE_NAME>:
Figure 18
Creation of ENM LDAP User for BSC Node
— SystemSecurityAdministrator
EricssonSupport
— BscApplicationAdministrator
— SystemReadOnly
— CpRole0
For all the roles that are applied to the user, the Target Groups can be set to
ALL, based on user requirements.
For example:
Figure 20
Online Enrollment URI IP from ENM Server
11. Run the following command to obtain the Trust Distribution Point Service
(TDPS) URLs for each of the three required ENM CA certificates.
The TDPS URLs are used to download the ENM CA certificates to the node.
Figure 22
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
ENM_PKI_Root_CA:
ENM_Infrastructure_CA:
ENM_OAM_CA:
NE_OAM_CA:
(config-CertM=1)>show
localFileStorePath="certificates"
userLabel="Certificate Management"
reportProgress
actionId=0
actionName="installTrustedCertFromUri"
additionalInfo
"TrustedCertificate=13"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the certificate file"
state=FINISHED
timeActionCompleted="2012-10-17T11:34:56"
timeActionStarted="2012-10-17T11:34:56"
timeOfLastStatusUpdate="201
(CertM=1)>TrustedCertificate=13
(TrustedCertificate=13)>show
TrustedCertificate=13
certificateState=VALID
reservedBy
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,Enrollment →
Authority=1"
certificateContent="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=ENM_PKI_Ro →
ot_CA"
extensionContent
"X509v3 Basic Constraints:CA:TRUE"
"X509v3 Key Usage:Certificate Sign, CRL Sign"
"X509v3 Subject Key Identifier:08:66:71:94:6E:05:FD:53:46:24:C5:7B →
:AB:8E:AF:2E:0F:F5:16:6D"
issuer="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=ENM_PKI_Root_CA"
keyUsage="Certificate Sign, CRL Sign"
publicKey="8C:4C:56:5B:1B:37:E2:A1:B1:70:15:D2:BE:FC:2C:1E:79:09:1 →
4:F9:C4:5F:7C:1F:66:0C:B1:36:75:02:61:8C:F5:82:3E:CF:E9:AD:19:50:35 →
:1D:FD:35:EB:76:94:57:90:CF:A1:C4:D3:06:52:76:DD:99:46:B2:77:D6:25: →
A3:6A:E6:68:B4:89:72:46:0E:69:42:73:BE:1B:F6:64:2D:24:8A:4D:28:5C:7 →
1:4C:EB:35:1A:7A:A1:01:28:4C:EE:59:CD:D4:11:19:E4:F0:A3:6D:67:72:AB →
:40:92:FC:3C:21:ED:F7:0D:72:44:56:68:57:F6:E7:3D:3E:D6:CB:C3:F3:F7: →
50:28:5A:FB:AA:29:ED:BE:C9:5C:CE:2A:89:44:31:22:35:84:66:9D:79:69:E →
B:BC:6A:01:29:81:A8:6B:B7:18:1D:48:E0:D7:80:64:CC:C1:D6:39:D7:B1:5F →
:75:DD:E6:AE:17:F5:E9:22:BD:48:49:47:4B:42:D2:91:6C:56:28:7E:41:4E: →
76:31:6E:49:7B:76:60:35:D9:82:67:57:D1:45:DE:F4:0C:DA:EC:EC:F9:BE:C →
9:69:C6:AF:75:34:32:49:EB:17:9A:2D:95:7A:B2:62:9D:A7:DD:C8:D4:E1:F5 →
:8A:41:00:43:6C:04:0A:F6:38:7A:C1:3B:65:81"
publicKeyAlgorithm="RSA"
serialNumber="70:BD:99:75:22:BA:83:4F"
signatureAlgorithm="sha256WithRSAEncryption"
validFrom="2018-11-29T18:37:57Z"
validTo="2028-11-29T18:37:57Z"
version="Version 3"
(TrustedCertificate=13)>
(CertM=1)>TrustCategory=1
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustedCer →
tificate=1"
(TrustCategory=1)>configure
(config-TrustCategory=1)>trustedCertificates="ManagedElement=BSC028 →
,SystemFunctions=1,SecM=1,CertM=1,TrustedCertificate=13"
(config-TrustCategory=1)>commit
(TrustCategory=1)>show
TrustCategory=1
trustedCertificates
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustedCer →
tificate=13"
(config-TrustCategory=1)>
Node Configuration
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
14. Navigate to the CertM MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
15. Execute the show command on the CertM MO to display the installed
NodeCredentials on the NE.
The example shows one NodeCredential on the node.
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
(config)>dn -m CertM
ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1
(config-CertM=1)>EnrollmentAuthority=1
(config-EnrollmentAuthority=1)>enrollmentAuthorityName="OU=BUCI_DUA →
C_NAM,C=SE,O=ERICSSON,CN=NE_OAM_CA"
(config-EnrollmentAuthority=1)>authorityType=REGISTRATION_AUTHORITY
(config-EnrollmentAuthority=1)>enrollmentCaCertificate="ManagedElem →
ent=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustedCertificate=13"
(config-EnrollmentAuthority=1)>commit -s
(config-EnrollmentAuthority=1)>up
(config-CertM=1)>EnrollmentServerGroup=1
(config-EnrollmentServerGroup=1)>commit -s
(config-EnrollmentServerGroup=1)>EnrollmentServer=1
(config-EnrollmentServerGroup=1)>enrollmentAuthority="ManagedElemen →
t=BSC028,SystemFunctions=1,SecM=1,CertM=1,EnrollmentAuthority=1" <d →
eprecated>
(config-EnrollmentServer=1)>protocol=CMP
(config-EnrollmentServer=1)>uri="http://131.160.146.36:8091/pkira-c →
mp/NE_OAM_CA/synch"
(config-EnrollmentServer=1)>commit -s
(config-EnrollmentServer=1)>top
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>configure
(config-CertM=1)>NodeCredential=1
(config-NodeCredential=1)>enrollmentAuthority="ManagedElement=BSC02 →
8,SystemFunctions=1,SecM=1,CertM=1,EnrollmentAuthority=1"
(config-NodeCredential=1)>enrollmentServerGroup="ManagedElement=BSC →
028,SystemFunctions=1,SecM=1,CertM=1,EnrollmentServerGroup=1"
(config-NodeCredential=1)>keyInfo=RSA_2048
(config-NodeCredential=1)>renewalMode=MANUAL
(config-NodeCredential=1)>subjectName="CN=BSC028-oam,C=SE,O=ERICSSO →
N,OU=BUCI DUAC NAM"
(config-NodeCredential=1)>commit -s
(NodeCredential=1)>startOnlineEnrollment --challengePassword passwo →
rd --<OTP set for the PKI entity created>
true
(config-NodeCredential=1)>show
NodeCredential=ENM
certificateState=VALID
enrollmentAuthority="ManagedElement=BSC028,SystemFunctions=1,SecM= →
1,CertM=1,EnrollmentAuthority=1"
enrollmentServerGroup="ManagedElement=BSC028,SystemFunctions=1,Sec →
M=1,CertM=1,EnrollmentServerGroup=1"
keyInfo=RSA_2048
subjectName="CN=BSC028-oam,C=SE,O=ERICSSON,OU=BUCI DUAC NAM"
certificateContent="OU=BUCI DUAC NAM,O=ERICSSON,C=SE,CN=BSC028-oam →
"
extensionContent
"X509v3 Authority Key Identifier:keyid:0D:33:C2:65:10:23:0F:4F:D2: →
D1:A4:21:5F:9E:6D:6A:B1:9A:FD:D3"
"X509v3 Basic Constraints:CA:FALSE"
"X509v3 CRL Distribution Points:Full Name:\n URI:http://131.160.14 →
6.36:8092/pki-cdps?ca_name=NE_OAM_CA&ca_cert_serialnumber=6da725860 →
54653e8\n\nFull Name:\n URI:http://[2001:1b70:82a1:146:0:609:5324:4 →
3]:8092/pki-cdps?ca_name=NE_OAM_CA&ca_cert_serialnumber=6da72586054 →
653e8"
"X509v3 Key Usage:Digital Signature, Key Encipherment, Key Agreeme →
nt"
"X509v3 Subject Key Identifier:A4:36:A6:87:13:45:28:1F:93:CC:D9:B3 →
:ED:84:54:2A:97:15:EC:FE"
issuer="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=NE_OAM_CA"
keyUsage="Digital Signature, Key Encipherment, Key Agreement"
publicKey="C5:1C:6D:F6:EB:69:20:3F:C9:D8:B8:B1:EF:FF:A5:69:E2:1F:5 →
5:A1:73:F7:8D:E4:FB:AF:9B:3E:42:A9:58:25:B0:7D:7B:85:BC:7C:FB:C4:18 →
:10:81:CD:88:A8:4D:2F:8D:04:00:69:11:BA:00:76:18:DC:4B:7B:CF:13:0F: →
6B:24:07:75:57:5A:53:48:D4:63:5D:C9:2C:C8:AB:5C:9B:D8:6C:D0:FE:17:F →
8:9D:49:1E:2C:2D:E4:E7:DD:FE:77:D3:E8:A0:6C:7A:FD:93:50:6C:06:D0:AF →
:0C:3E:18:B4:F2:DE:DB:F2:FC:88:69:EA:92:D2:B5:FD:12:04:36:C7:75:4F: →
0C:0C:44:D3:38:FE:6E:52:54:A8:5F:83:FA:51:9C:56:39:45:34:DD:48:0B:B →
6:E9:B0:9A:69:08:E9:7C:DF:18:05:87:D0:71:ED:39:39:EE:2C:32:CB:54:5C →
:91:F3:D6:C0:A1:36:BB:25:27:2E:AD:CF:C9:59:29:27:61:3D:83:B5:3E:7F: →
85:60:F2:BF:39:E4:C0:0F:B7:36:D2:B5:B9:15:B6:BD:9E:2E:93:17:22:9F:1 →
D:C0:97:9D:BC:CF:3F:1F:B7:4D:C1:EF:13:4B:AB:76:FD:3D:27:42:6B:0A:A4 →
:6A:29:EB:75:5B:A4:B8:D6:CA:5F:EF:F5:62:27"
publicKeyAlgorithm="RSA"
serialNumber="0E:FF:70:C5:70:DE:67:D0"
signatureAlgorithm="sha256WithRSAEncryption"
validFrom="2019-02-18T12:14:43Z"
validTo="2021-02-18T12:14:43Z"
version="Version 3"
enrollmentProgress
actionId=0
actionName="startOnlineEnrollment"
additionalInfo
"warning: certificate chain is discontinuous"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the online service"
state=FINISHED
timeActionCompleted="2019-02-18T12:45:30Z"
timeActionStarted="2019-02-18T12:45:28Z"
timeOfLastStatusUpdate="2019-02-18T12:45:30Z"
ChainCertificate=2
ChainCertificate=1
ChainCertificate=3
(config-NodeCredential=ENM)>
This procedure reconfigures LDAP credentials on the BSC to use ENM LDAP
server.
17. Navigate to the Ldap=1 MO in the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
18. Configure the LDAP MO details as described in the LDAP details values.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5223,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e →
3,ou=proxyagent,ou=com,dc=ieatlms5223,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.128.123"
(config-Ldap=1)>ldapIpAddress="131.160.128.124"
(config-Ldap=1)>bindPassword="TLnH6ywUvNHWrAvdeHzZzswS" cleartext
(config-Ldap=1)>serverPort=1636
(config-Ldap=1)>nodeCredential="ManagedElement=BSC028,SystemFunctions=1,SecM →
=1,CertM=1,NodeCredential=1"
(config-Ldap=1)>trustCategory="ManagedElement=BSC028,SystemFunctions=1,SecM= →
1,CertM=1,TrustCategory=1"
(config-Ldap=1)>commit
(Ldap=1)>show
Ldap=1
baseDn="dc=ieatlms5223,dc=com"
bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e3,ou=proxyagent, →
ou=com,dc=ieatlms5223,dc=com"
bindPassword="1:3Ya7eqe7dmeEpqzlSnWw/Ygcj+kZcsZs"
fallbackLdapIpAddress="131.160.128.123"
ldapIpAddress="131.160.128.124"
nodeCredential="ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,NodeC →
redential=1"
profileFilter=ERICSSON_FILTER
serverPort=1636
tlsMode=LDAPS
trustCategory="ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustC →
ategory=1"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
Note: NodeCredential=1
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1, →
LdapAuthenticationMethod=1
>dn -m LdapAuthenticationMethod
ManagedElement=BSC028,SystemFunctions=1,SecM=1,UserManagem →
ent=1,LdapAuthenticationMethod=1
(LdapAuthenticationMethod=1)>configure
(config-LdapAuthenticationMethod=1)>administrativeState=UN →
LOCKED
(config-LdapAuthenticationMethod=1)>commit
(LdapAuthenticationMethod=1)>show
LdapAuthenticationMethod=1
administrativeState=UNLOCKED
Ldap=1
(LdapAuthenticationMethod=1)>
(MmlAuthorizationM=1)>show -v
MmlAuthorizationM=1
ignoreCpSuperUserRole=false <default> <read-only>
ignoreCpUserRoles=false <default> <read-only>
mmlAuthorizationMethod=COCA
mmlAuthorizationMId="1"
MmlRole=CpRole0
(MmlAuthorizationM=1)>
Results
Verification of the online enrollment:
ENM LDAP user for BSC is able to access to BSC node and must have the roles
added during the procedure.
Note: For all the nodes, which support offline enrollment, alarm has to be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
Steps
— Node Configuration.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System and use it for communication with other ENM systems. End
Entities must be created in the PKI system.
For more information about entity and profiles, see the section ENM PKI
Concepts of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Figure 23
The highlighted profile is the default profile used when OAM enrollment is
performed for BSC nodes.
Note: PKI End Entity creation can be referred either from Step 3 or Step 4.
The EEs are created starting from an XML file. The template for the XML file is
the following (End-Entity.xml):
<?xml version="1.0"?>
<Entities xsi:noNamespaceSchemaLocation="EntitiesSchema.xsd" xmlns:xsi="http →
://www.w3.org/2001/XMLSchema-instance">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
<OTP>Ericsson01</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
During the XML file creation, the following rules must be applied:
— In the <EntityInfo> tag, the <name> must be <Network Element ID-
oam>.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the BSC node is added in ENM.
The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the tag, the Password is needed to perform
the startOnlineEnrollment action on the node.BSC node is added in ENM.
Save the created XML file. The suggested name for the file is EE_Network
Element ID-oam.xml.
Drag and drop the created XML file into the ENM CLI and run the command to
create the End Entity:
4. Create the End Entity from PKI Entity Management (through GUI).
The End Entity must be created with name <Network Element ID-oam>
and its status is NEW. In the following example, there is the End Entity related
to <BSC Node NE_NAME>:
Figure 24
The p12 file also contains the corresponding private key of the End Entity.
pkiadm ctm EECert -gen -nocsr -en BSC028-oam -f P12 --password <password>
— SystemSecurityAdministrator
EricssonSupport
— BscApplicationAdministrator
— SystemReadOnly
— CpRole0
For all the roles that are applied to the user, the Target Groups can be set to
ALL, based on user requirements.
For example:
Figure 26
LDAP Details from ENM CLI.
Figure 28
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
13. Navigate to the CertM MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
14. Download, sftped and install the trust certificates using the file.
(config-CertM=1)>show
localFileStorePath="certificates"
userLabel="Certificate Management"
reportProgress
actionId=0
actionName="installTrustedCertFromUri"
additionalInfo
"TrustedCertificate=13"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the certificate file"
state=FINISHED
timeActionCompleted="2012-10-17T11:34:56"
timeActionStarted="2012-10-17T11:34:56"
timeOfLastStatusUpdate="201
(CertM=1)>TrustedCertificate=13
(TrustedCertificate=13)>show
TrustedCertificate=13
certificateState=VALID
reservedBy
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,EnrollmentA →
uthority=1"
certificateContent="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=ENM_PKI_Roo →
t_CA"
extensionContent
"X509v3 Basic Constraints:CA:TRUE"
"X509v3 Key Usage:Certificate Sign, CRL Sign"
"X509v3 Subject Key Identifier:08:66:71:94:6E:05:FD:53:46:24:C5:7B: →
AB:8E:AF:2E:0F:F5:16:6D"
issuer="C=SE,OU=BUCI_DUAC_NAM,O=ERICSSON,CN=ENM_PKI_Root_CA"
keyUsage="Certificate Sign, CRL Sign"
publicKey="8C:4C:56:5B:1B:37:E2:A1:B1:70:15:D2:BE:FC:2C:1E:79:09:14 →
:F9:C4:5F:7C:1F:66:0C:B1:36:75:02:61:8C:F5:82:3E:CF:E9:AD:19:50:35: →
1D:FD:35:EB:76:94:57:90:CF:A1:C4:D3:06:52:76:DD:99:46:B2:77:D6:25:A →
3:6A:E6:68:B4:89:72:46:0E:69:42:73:BE:1B:F6:64:2D:24:8A:4D:28:5C:71 →
:4C:EB:35:1A:7A:A1:01:28:4C:EE:59:CD:D4:11:19:E4:F0:A3:6D:67:72:AB: →
40:92:FC:3C:21:ED:F7:0D:72:44:56:68:57:F6:E7:3D:3E:D6:CB:C3:F3:F7:5 →
0:28:5A:FB:AA:29:ED:BE:C9:5C:CE:2A:89:44:31:22:35:84:66:9D:79:69:EB →
:BC:6A:01:29:81:A8:6B:B7:18:1D:48:E0:D7:80:64:CC:C1:D6:39:D7:B1:5F: →
75:DD:E6:AE:17:F5:E9:22:BD:48:49:47:4B:42:D2:91:6C:56:28:7E:41:4E:7 →
6:31:6E:49:7B:76:60:35:D9:82:67:57:D1:45:DE:F4:0C:DA:EC:EC:F9:BE:C9 →
:69:C6:AF:75:34:32:49:EB:17:9A:2D:95:7A:B2:62:9D:A7:DD:C8:D4:E1:F5: →
8A:41:00:43:6C:04:0A:F6:38:7A:C1:3B:65:81"
publicKeyAlgorithm="RSA"
serialNumber="70:BD:99:75:22:BA:83:4F"
signatureAlgorithm="sha256WithRSAEncryption"
validFrom="2018-11-29T18:37:57Z"
validTo="2028-11-29T18:37:57Z"
version="Version 3"
(TrustedCertificate=13)>
(CertM=1)>TrustCategory=1
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustedCert →
ificate=1"
(TrustCategory=1)>configure
(config-TrustCategory=1)>trustedCertificates="ManagedElement=BSC028 →
,SystemFunctions=1,SecM=1,CertM=1,TrustedCertificate=13"
(config-TrustCategory=1)>commit
(TrustCategory=1)>show
TrustCategory=1
trustedCertificates
"ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustedCert →
ificate=13"
(config-TrustCategory=1)>
Node Configuration
This section describes the configuration of the Node Credential MO in the BSC.
ssh <TS_USER_NAME>@<NE_IP_ADDRESS>
....input TS User password
16. Navigate to the CertM MO of the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,CertM=1
17. Execute the show command on the CertM MO to display the installed
NodeCredentials on the NE.
(CertM=1)>show
CertM=1
localFileStorePath="certificates"
CertMCapabilities=1
EnrollmentAuthority=1
EnrollmentServerGroup=1
NodeCredential=1
TrustCategory=1
TrustedCertificate=1
>dn -m CertM
ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1
(CertM=1)>
(CertM=1)>configure
(config-CertM=1)>NodeCredential=1
(config-NodeCredential=1)>commit
(NodeCredential=1)>
(NodeCredential=1)>installCredentialFromUri sftp://root@LMS_IP/tmp/NE_NAME-o →
am.p12 <LMS Password> <Password of P12 file> NULL
true
(NodeCredential=1)>show enrollmentProgress
enrollmentProgress
actionId=0
actionName="installCredentialFromUri"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the container file"
state=FINISHED
timeActionCompleted="2017-08-05T12:37:36Z"
timeActionStarted="2017-08-05T12:37:36Z"
timeOfLastStatusUpdate="2017-08-05T12:37:36Z"
(NodeCredential=1)>
Note: The password of the P12 file is the same password used for creating
P12 file from Step 6.
The node credential certificates can be downloaded, SFTP to the node, and
installed using the file:
(CertM=1)>NodeCredential=1
(NodeCredential=1)>configure
(config-NodeCredential=1)>installCredentialFromUri NE_NAME-oam.p12 NULL <Pas →
sword of P12 file> NULL
true
(NodeCredential=1)>show enrollmentProgress
enrollmentProgress
actionId=0
actionName="installCredentialFromUri"
progressInfo=""
progressPercentage=100
result=SUCCESS
resultInfo="installed from the container file"
state=FINISHED
timeActionCompleted="2017-08-05T12:37:36Z"
timeActionStarted="2017-08-05T12:37:36Z"
timeOfLastStatusUpdate="2017-08-05T12:37:36Z"
(NodeCredential=1)>
Note: Make sure that the enrollment progress is 100 percent completed.
To verify the same, the command show enrollmentProgress can
be used.
Reconfigure LDAP Credentials to use ENM LDAP Server
20. Navigate to the Ldap=1 MO in the node by tabbing out each comma-
separated MO.
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1,Ldap=1
21. Configure the LDAP MO details inside node using the LDAP details.
(Ldap=1)>
(Ldap=1)>configure
(config-Ldap=1)>baseDn="dc=ieatlms5223,dc=com"
(config-Ldap=1)>bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e →
3,ou=proxyagent,ou=com,dc=ieatlms5223,dc=com"
(config-Ldap=1)>fallbackLdapIpAddress="131.160.128.123"
(config-Ldap=1)>ldapIpAddress="131.160.128.124"
(config-Ldap=1)>bindPassword="TLnH6ywUvNHWrAvdeHzZzswS" cleartext
(config-Ldap=1)>serverPort=1636
(config-Ldap=1)>nodeCredential="ManagedElement=BSC028,SystemFunctions=1,SecM →
=1,CertM=1,NodeCredential=1"
(config-Ldap=1)>trustCategory="ManagedElement=BSC028,SystemFunctions=1,SecM= →
1,CertM=1,TrustCategory=1"
(config-Ldap=1)>commit
(Ldap=1)>show
Ldap=1
baseDn="dc=ieatlms5223,dc=com"
bindDn="cn=ProxyAccount__b380035f-e8e1-4819-9256-94b1024074e3,,ou=proxyagent →
,ou=com,dc=ieatlms5223,dc=com"
bindPassword="1:3Ya7eqe7dmeEpqzlSnWw/Ygcj+kZcsZs"
fallbackLdapIpAddress="131.160.128.123"
ldapIpAddress="131.160.128.124"
nodeCredential="ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,NodeC →
redential=1"
profileFilter=ERICSSON_FILTER
serverPort=1636
tlsMode=LDAPS
trustCategory="ManagedElement=BSC028,SystemFunctions=1,SecM=1,CertM=1,TrustC →
ategory=1"
useTls=true
EricssonFilter=1
Filter=1
(Ldap=1)>
ManagedElement=<NE_NAME>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthe →
nticationMethod=1
>dn -m LdapAuthenticationMethod
ManagedElement=BSC028,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthenti →
cationMethod=1
(LdapAuthenticationMethod=1)>configure
(config-LdapAuthenticationMethod=1)>administrativeState=UNLOCKED
(config-LdapAuthenticationMethod=1)>commit
(LdapAuthenticationMethod=1)>show
LdapAuthenticationMethod=1
administrativeState=UNLOCKED
Ldap=1
(LdapAuthenticationMethod=1)>
>ManagedElement=BSC028,SystemFunctions=1,AxeFunctions=1,SecurityHandling=1,M →
mlAuthorizationM=1
(MmlAuthorizationM=1)>show -v
MmlAuthorizationM=1
ignoreCpSuperUserRole=false <default> <read-only>
ignoreCpUserRoles=false <default> <read-only>
mmlAuthorizationMethod=COCA
mmlAuthorizationMId="1"
MmlRole=CpRole0
(MmlAuthorizationM=1)>
Results
Verification of offline enrollment:
ENM LDAP user for BSC is able to access BSC node and must have the roles
added during the procedure.
Prerequisites
— PKI_Administrator role to access the pkiadm commands.
— Admin User Credentials to log on to the Node CNF, and to create Security
Admin User on the Node.
Steps
The offline enrollment can be achieved by following these five main steps:
— End Entity creation in ENM PKI Entity Management. See the section End
Entity Creation in ENM PKI on page 144.
— Generation and Installation of node certificate on the node. See the section
Generation and Installation of Node Certificate on the Node on page 150.
— LDAP configuration on the node. See the section LDAP Configuration on the
Node on page 151.
End Entities (EE) of the PKI System are the end users who get credentials
from the ENM PKI System and use it for secure communications.
A valid End Entity must be created in the ENM PKI by executing the following
steps before performing the Offline Enrollment for the node.
Steps
Figure 29
The highlighted profile is the default profile used when OAM Enrollment is
performed for vDU nodes.
Note: For more information about Entity and Profiles, see the section
ENM PKI Concepts in the ENM Public Key Infrastructure System
Administrator Guide, Reference [8].
The EEs are created starting from an XML file. The template for the XML file
is the following (Network Element ID-oam.xml):
<Subject>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value> //This value has to be copied from En →
tity Profile DUSGen2OAM_CHAIN_EP
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value> //This value has to be copied fr →
om Entity Profile DUSGen2OAM_CHAIN_EP
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value> //This value has to be cop →
ied from Entity Profile DUSGen2OAM_CHAIN_EP
</SubjectField>
</Subject>
<OTP>cies62UIUgq2IG9zXbaJf</OTP>
<OTPCount>4</OTPCount>
<Issuer>
<Name>NE_OAM_CA</Name>
</Issuer>
</EntityInfo>
<OTPValidityPeriod>30</OTPValidityPeriod>
</Entity>
</Entities>
During the XML file creation, the following rules must be applied:
b. The <NetworkElementID> is the identifier that the user must use at the
end of this procedure when the vDU node is added in ENM.
The End Entity is to be created with name <Network Element ID-oam> and
its entity status must be NEW.
In the following example, there is the End Entity related to vDU Node:
Figure 30
Note: If the secure user is already present on the node, then creation of secure
user on node is not required.
Steps
1. Connect to the node through NETCONF over SSH from ENM with secure user
credentials.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
2. Connect to the node through NETCONF over SSH from ENM using admin
user credentials.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
6. Connect to the node with NETCONF over SSH from ENM with the created
secure user credentials. Update the default secure password with desired
secure user password.
See Update Secure User Password for the First SSH Connection with
Example on page 157.
The following trusted CA certificates must be installed on the node for the secure
OAM communications:
— NE_OAM_CA
— ENM_OAM_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
Steps
2. Install the certificate chain of the External CA until the self signed certificate,
if the ENM_PKI_Root_CA certificate is signed by that External CA.
If subject and issuer fields for the active certificate are different,
then that ENM_PKI_Root_CA is issued by External CA and you need
to perform the Step 2.b and Step 2.c, otherwise go to Step 3.
Example
Figure 31
b. List the external CAs present in the ENM PKI and check for the
certificates that must be installed on the node.
Example
Figure 32
c. Download the required External CA certificate.
Note: Use the same command to convert all the trust certificates to
Base64 format.
4. Connect to the node through NETCONF over SSH from ENM with secure user
credentials.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
See Input NETCONF Request to Create Trusted Certificate List on Node with
Example on page 158.
7. Install all the trusted certificates on the node which are downloaded and
converted to base64 format in Step 3.
Steps
pkiadm ctm EECert -gen -nocsr -en <NetworkElementId-oam> -f P12 --password < →
provide password here>
Use the following Linux command in the Linux terminal to convert the P12
file to Base64 encoded format.
3. Connect to the node through NETCONF over SSH from ENM with secure user
credentials.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
5. Install the node certificate and private key using the base64 converted p12
file in Step 2.
See Input NETCONF Request for Node Certificate Installation on Node with
Example on page 163.
Steps
Example
2. Connect to the node through NETCONF over SSH from ENM with secure user
credentials.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
4. Configure LDAP server details on the node from the output of Step 1.
See Input NETCONF Request to Install LDAP Configuration on Node with
Example on page 167.
6. Connect to the node through NETCONF over SSH from ENM with user having
COM roles and its associated COM Target Group assigned with "ALL" to
verify the LDAP feature working.
See Connect to the Node with NETCONF over SSH from ENM on page 152.
6.8.11.6 Connect to the Node with NETCONF over SSH from ENM
1. Connect to the node using netconf port with either admin user or secure user
or COM user credentials and node ip-address.
Example
[root@stsvp6enm40-mscmce-0 certs]# ssh -p 830 [email protected]
WARNING: This system is restricted solely to authorized users for legitimat →
e business purposes only. The actual or attempted unauthorized access, use, →
or modification of this system is strictly prohibited. Unauthorized users ar →
e subject to appropriate disciplinary proceedings and/or criminal and civil →
penalties under state, federal, or other applicable domestic and foreign law →
s. The use of this system is recorded and monitored. If monitoring reveals p →
ossible evidence of criminal activity, the owner of this equipment may provi →
de the evidence of such activity to law enforcement officials. All authorize →
d users shall comply with the security policies, instructions and requiremen →
ts related to the business purpose and in case of doubt shall seek advice fr →
om his/her manager.
This system process personal data. The misuse of personal data could cause h →
arm to the data subjects. Be aware of the confidentiality obligations you ha →
ve when accessing personal data and the disciplinary consequences of imprope →
r handling.
Password:
<?xml version="1.0" encoding="UTF-8"?>
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<capabilities>
<capability>urn:ietf:params:netconf:base:1.0</capability>
<capability>urn:ietf:params:netconf:base:1.1</capability>
<capability>urn:ietf:params:netconf:capability:writable-running:1.0</capabil →
ity>
<capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capabi →
lity>
<capability>urn:ietf:params:netconf:capability:validate:1.0</capability>
<capability>urn:ietf:params:netconf:capability:validate:1.1</capability>
<capability>urn:ietf:params:netconf:capability:xpath:1.0</capability>
<capability>urn:ietf:params:netconf:capability:notification:1.0</capability>
<capability>urn:ietf:params:netconf:capability:interleave:1.0</capability>
<capability>urn:ietf:params:netconf:capability:partial-lock:1.0</capability>
<capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode= →
explicit&also-supported=report-all-tagged,report-all</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=201 →
9-01-04&module-set-id=f3d0af818ce1c8aabb947dc1f52a4fcc</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.1?revision=201 →
9-01-04&content-id=f3d0af818ce1c8aabb947dc1f52a4fcc</capability>
<capability>http://tail-f.com/ns/netconf/actions/1.0</capability>
<capability>http://tail-f.com/ns/aaa/1.1?module=tailf-aaa&revision=2018-09-1 →
2</capability>
<capability>http://tail-f.com/ns/common/query?module=tailf-common-query&revi →
sion=2017-12-15</capability>
<capability>http://tail-f.com/ns/confd-progress?module=tailf-confd-progress& →
revision=2020-06-29</capability>
<capability>http://tail-f.com/ns/kicker?module=tailf-kicker&revision=2017-09 →
-28</capability>
<capability>http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&re →
vision=2017-01-06</capability>
<capability>http://tail-f.com/yang/acm?module=tailf-acm&revision=2013-03-07< →
/capability>
<capability>http://tail-f.com/yang/common?module=tailf-common&revision=2020- →
06-25</capability>
<capability>http://tail-f.com/yang/common-monitoring?module=tailf-common-mon →
itoring&revision=2019-04-09</capability>
<capability>http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monit →
oring&revision=2019-10-30</capability>
<capability>http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-m →
onitoring&revision=2019-03-28</capability>
<capability>http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&revision →
=2017-11-20</capability>
<capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&revi →
sion=2011-06-01&features=writable-running,rollback-on-error,validate,xpath</ →
capability>
<capability>urn:ietf:params:xml:ns:netconf:partial-lock:1.0?module=ietf-netc →
onf-partial-lock&revision=2009-10-19</capability>
<capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-ha →
sh&revision=2014-08-06&features=crypt-hash-sha-512,crypt-hash-sha-256,crypt- →
hash-md5</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-typ →
es&revision=2013-07-15</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf →
-acm&revision=2018-02-14</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf- →
netconf-monitoring&revision=2010-10-04</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ie →
tf-netconf-notifications&revision=2012-02-06</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ie →
tf-netconf-with-defaults&revision=2011-06-01</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-system?module=ietf-system&revis →
ion=2014-08-06&features=local-users,authentication&deviations=ericsson-syste →
m-ext,ericsson-system-ext-aum</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang- →
metadata&revision=2016-08-05</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-typ →
es&revision=2013-07-15</capability>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-notifications?module=eri →
csson-notifications&revision=2018-05-28&features=netconf-state-change</capab →
ility>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-yang-extensions?module=e →
ricsson-yang-extensions&revision=2020-01-02</capability>
</capabilities>
<session-id>119</session-id></hello>]]>]]>
1. Send a NETCONF Hello Request to the Node after every SSH connection.
Example
<?xml version="1.0" encoding="UTF-8"?>
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<capabilities>
<capability>urn:ietf:params:netconf:base:1.0</capability>
<capability>urn:ietf:params:netconf:base:1.1</capability>
<capability>urn:ietf:params:netconf:capability:writable-running:1.0</capabil →
ity>
<capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</capabi →
lity>
<capability>urn:ietf:params:netconf:capability:validate:1.0</capability>
<capability>urn:ietf:params:netconf:capability:validate:1.1</capability>
<capability>urn:ietf:params:netconf:capability:xpath:1.0</capability>
<capability>urn:ietf:params:netconf:capability:notification:1.0</capability>
<capability>urn:ietf:params:netconf:capability:interleave:1.0</capability>
<capability>urn:ietf:params:netconf:capability:partial-lock:1.0</capability>
<capability>urn:ietf:params:netconf:capability:with-defaults:1.0?basic-mode= →
explicit&also-supported=report-all-tagged,report-all</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.0?revision=201 →
9-01-04&module-set-id=f3d0af818ce1c8aabb947dc1f52a4fcc</capability>
<capability>urn:ietf:params:netconf:capability:yang-library:1.1?revision=201 →
9-01-04&content-id=f3d0af818ce1c8aabb947dc1f52a4fcc</capability>
<capability>http://tail-f.com/ns/netconf/actions/1.0</capability>
<capability>http://tail-f.com/ns/aaa/1.1?module=tailf-aaa&revision=2018-09-1 →
2</capability>
<capability>http://tail-f.com/ns/common/query?module=tailf-common-query&revi →
sion=2017-12-15</capability>
<capability>http://tail-f.com/ns/confd-progress?module=tailf-confd-progress& →
revision=2020-06-29</capability>
<capability>http://tail-f.com/ns/kicker?module=tailf-kicker&revision=2017-09 →
-28</capability>
<capability>http://tail-f.com/ns/netconf/query?module=tailf-netconf-query&re →
vision=2017-01-06</capability>
<capability>http://tail-f.com/yang/acm?module=tailf-acm&revision=2013-03-07< →
/capability>
<capability>http://tail-f.com/yang/common?module=tailf-common&revision=2020- →
06-25</capability>
<capability>http://tail-f.com/yang/common-monitoring?module=tailf-common-mon →
itoring&revision=2019-04-09</capability>
<capability>http://tail-f.com/yang/confd-monitoring?module=tailf-confd-monit →
oring&revision=2019-10-30</capability>
<capability>http://tail-f.com/yang/netconf-monitoring?module=tailf-netconf-m →
onitoring&revision=2019-03-28</capability>
<capability>http://tail-f.com/yang/xsd-types?module=tailf-xsd-types&revision →
=2017-11-20</capability>
<capability>urn:ietf:params:xml:ns:netconf:base:1.0?module=ietf-netconf&revi →
sion=2011-06-01&features=writable-running,rollback-on-error,validate,xpath</ →
capability>
<capability>urn:ietf:params:xml:ns:netconf:partial-lock:1.0?module=ietf-netc →
onf-partial-lock&revision=2009-10-19</capability>
<capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-ha →
sh&revision=2014-08-06&features=crypt-hash-sha-512,crypt-hash-sha-256,crypt- →
hash-md5</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-typ →
es&revision=2013-07-15</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf →
-acm&revision=2018-02-14</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf- →
netconf-monitoring&revision=2010-10-04</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ie →
tf-netconf-notifications&revision=2012-02-06</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ie →
tf-netconf-with-defaults&revision=2011-06-01</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-system?module=ietf-system&revis →
ion=2014-08-06&features=local-users,authentication&deviations=ericsson-syste →
m-ext,ericsson-system-ext-aum</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang- →
metadata&revision=2016-08-05</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-typ →
es&revision=2013-07-15</capability>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-notifications?module=eri →
csson-notifications&revision=2018-05-28&features=netconf-state-change</capab →
ility>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-yang-extensions?module=e →
ricsson-yang-extensions&revision=2020-01-02</capability>
</capabilities>
<session-id>119</session-id></hello>]]>]]><?xml version="1.0" encoding="UTF →
-8"?>
<hello xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<capabilities>
<capability>urn:ietf:params:netconf:base:1.0</capability>
<capability>urn:ietf:params:netconf:capability:notification:1.0</capab →
ility>
<capability>urn:ietf:params:netconf:capability:candidate:1.0</capabili →
ty>
<capability>urn:ietf:params:netconf:capability:rollback-on-error:1.0</ →
capability>
<capability>urn:ietf:params:netconf:capability:confimed-commit:1.1</ca →
pability>
<capability>urn:ietf:params:netconf:capability:startup:1.0</capability →
>
</capabilities>
</hello>
]]>]]>
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="close-netconf-session" xmlns="urn:ietf:params:xml:ns:netcon →
f:base:1.0">
<close-session/>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="close →
6.8.11.9 Input NETCONF Request for Creation of Secure User on Node with Example
Note: Under the <user> tag, the <name> value must be secure username
and <password> value must be admin.
Example
-------------------------------------------------------------------------
/* Previous Netconf content is ignored to improve readability */
-------------------------------------------------------------------------
</hello>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="1"><d →
ata></data></rpc-reply>]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="create-sec →
-admin">
<edit-config>
<target>
<running />
</target>
<config>
<system xmlns="urn:ietf:params:xml:ns:yang:ietf-system">
<authentication>
<user>
<name>expert</name>
<password>admin</password>
<user-label xmlns="urn:rdns:com:ericsson:oammodel:ericsson →
-system-ext">security admin user</user-label>
<administrative-state xmlns="urn:rdns:com:ericsson:oammode →
l:ericsson-system-ext">unlocked</administrative-state>
<groups xmlns="urn:rdns:com:ericsson:oammodel:ericsson-sys →
tem-ext">system-security-admin</groups>
</user>
</authentication>
</system>
</config>
</edit-config>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="creat →
e-sec-admin"><ok/></rpc-reply>]]>]]>
6.8.11.10 Update Secure User Password for the First SSH Connection with Example
1. Connect to the node with secure user credentials created, and update the
default secure user password (admin) with the desired password.
onf-partial-lock&revision=2009-10-19</capability>
<capability>urn:ietf:params:xml:ns:yang:iana-crypt-hash?module=iana-crypt-ha →
sh&revision=2014-08-06&features=crypt-hash-sha-512,crypt-hash-sha-256,crypt- →
hash-md5</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-inet-types?module=ietf-inet-typ →
es&revision=2013-07-15</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-acm?module=ietf-netconf →
-acm&revision=2018-02-14</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-monitoring?module=ietf- →
netconf-monitoring&revision=2010-10-04</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-notifications?module=ie →
tf-netconf-notifications&revision=2012-02-06</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-netconf-with-defaults?module=ie →
tf-netconf-with-defaults&revision=2011-06-01</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-system?module=ietf-system&revis →
ion=2014-08-06&features=local-users,authentication&deviations=ericsson-syste →
m-ext,ericsson-system-ext-aum</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-metadata?module=ietf-yang- →
metadata&revision=2016-08-05</capability>
<capability>urn:ietf:params:xml:ns:yang:ietf-yang-types?module=ietf-yang-typ →
es&revision=2013-07-15</capability>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-notifications?module=eri →
csson-notifications&revision=2018-05-28&features=netconf-state-change</capab →
ility>
<capability>urn:rdns:com:ericsson:oammodel:ericsson-yang-extensions?module=e →
ricsson-yang-extensions&revision=2020-01-02</capability>
</capabilities>
<session-id>33</session-id></hello>]]>]]>
6.8.11.11 Input NETCONF Request to Create Trusted Certificate List on Node with Example
Example
-------------------------------------------------------------------------
/* Previous Netconf content is ignored to improve readability */
-------------------------------------------------------------------------
</hello>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="OAM C →
MP Server Trust Store"><data></data></rpc-reply>]]>]]><?xml version="1.0" en →
coding="UTF-8"?>
<rpc message-id="Create-oamtrustCategory-List" xmlns="urn:ietf:params:xml:ns →
:netconf:base:1.0">
<edit-config>
<target>
<running/>
</target>
<config xmlns:xc="urn:ietf:params:xml:ns:netconf:base:1.0">
<truststore xmlns="urn:ietf:params:xml:ns:yang:ietf-truststore"
xmlns:ts="urn:ietf:params:xml:ns:yang:ietf-truststore">
<certificates xc:operation="merge">
<name>oamTrustCategory</name>
<description>OAM trusted certs</description>
</certificates>
</truststore>
</config>
</edit-config>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="Creat →
e-oamtrustCategory-List"><ok/></rpc-reply>]]>]]>
6.8.11.12 Input NETCONF Request for Trusted Certificate Installation on Node with
Example
Example
Installing four trusted CA certificates
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="install-trustedCertificates-in-truststore" xmlns="urn:ietf: →
params:xml:ns:netconf:base:1.0">
<action xmlns="urn:ietf:params:xml:ns:yang:1">
<truststore xmlns="urn:ietf:params:xml:ns:yang:ietf-truststore">
<certificates>
<name>oamTrustCategory</name>
<install-certificate-pem xmlns="urn:rdns:com:ericsson:oammodel:e →
ricsson-truststore-ext">
<name>ENM_PKI_Root_CA</name>
<pem>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURlakNDQW1LZ0F →
3SUJBZ0lJWlQwVEYwOEM3UWd3RFFZSktvWklodmNOQVFFTEJRQXdXekVZTUJZR0ExVUUKQXd3UFJ →
VNU5YMUJMU1Y5U2IyOTBYME5CTVFzd0NRWURWUVFHRXdKVFJURVJNQThHQTFVRUNnd0lSWEpwWTN →
OegpiMjR4SHpBZEJnTlZCQXNNRmxKdmMyVnljMkpsY21kZmMzUnpkbkF6Wlc1dE1ESXdIaGNOTWp →
Fd056QTFNVFV6Ck1USXlXaGNOTXpFd056QTFNVFV6TVRJeVdqQmJNUmd3RmdZRFZRUUREQTlGVGs →
xZlVFdEpYMUp2YjNSZlEwRXgKQ3pBSkJnTlZCQVlUQWxORk1SRXdEd1lEVlFRS0RBaEZjbWxqYzN →
OdmJqRWZNQjBHQTFVRUN3d1dVbTl6WlhKegpZbVZ5WjE5emRITjJjRE5sYm0wd01qQ0NBU0l3RFF →
ZSktvWklodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCCkFJKzc5cWNtbnpiQ3BoYXZXNWMvUWR →
zeENUYVhvRWVOUGFkbjByNUJSRUxVSjdpdGttOTBlOC84c2l3TzlNKy8KVjU4THNPWnU4R1RRRDd →
XQy8rV0FQYVBoakxmUnBNcU5xY3hQMXBvamtLandxcHFKTFF0UXdiK2JUVW01NTlsVApUUW5RMi9 →
ic1l6Ny8vQ2tuMER6VFJTcGRucHpiakdxVnhyZzdxM2IvdURDRlFkeXhrSGZ6dEdLenZZa3dQMnN →
BClRtejJiYXJVTXRick9tWTVITDJJSXdENzJuM04yYW50Vkl0V1crbHVWakdTM3hjSFhrZGc3Sld →
Wb1NVZXNRQmwKRGczWlIzYVB0Vk1jNk5kS3NHOEZEaW41MGhXOUNtZXA1MjgrNzdaamdTNlVhUGx →
NaVhnV0JsL0xacU1jZjJWYgo3emQ1WkcvZnlZRC9jQi80REwyMVpOY0NBd0VBQWFOQ01FQXdIUVl →
EVlIwT0JCWUVGSTVJVW1aejRpbnd0TDllCnlRcjEwV255TEJpNU1BOEdBMVVkRXdFQi93UUZNQU1 →
CQWY4d0RnWURWUjBQQVFIL0JBUURBZ0VHTUEwR0NTcUcKU0liM0RRRUJDd1VBQTRJQkFRQU5rMk0 →
vRDk0L0lFbEF0RFNpcE9Na2hEVGkrNU5IVHE0bWYrajVZRWpneWhOOApXZzFkSThOZ3RJak13Y0I →
3RnZ4a1pYREIwRlJwWjdCMkdONlVqRktrR1NyZHNEazNHNW9zNElFam4wY3ZPL09NCmFzM1ZIMWl →
sZlVhV29IWExkZ0tkcHFDb1p0WVJ4MzdJblpPRGpDYVIyblZiaDZRaldSYlB5OXYxRXhNVjNmamE →
KOW9sOENEL2NlbmhWV1ZBNWpaby91WU1qeDZ2SVJlQVp5TXZtN2ZlNFpwSGg5cWRnN2FkT004dmF →
SdUgyME9Zdworc200TXAwQk8yZDRHSmpGSk43aU9VdUlLZmZOSFdTamZsdEs3YzBHbW5tQmtKK1J →
vT3JoTmNyM2o5ODhUWDlrCkZxTExBWG9UdzBRTE5FRTcrZVVnd0NFaEt5S0g0OXpsLzB6SlVUdHY →
KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=</pem>
</install-certificate-pem>
</certificates>
</truststore>
</action>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="insta →
ll-trustedCertificates-in-truststore"><ok/></rpc-reply>]]>]]><?xml version=" →
1.0" encoding="UTF-8"?>
<rpc message-id="install-trustedCertificates-in-truststore" xmlns="urn:ietf: →
params:xml:ns:netconf:base:1.0">
<action xmlns="urn:ietf:params:xml:ns:yang:1">
<truststore xmlns="urn:ietf:params:xml:ns:yang:ietf-truststore">
<certificates>
<name>oamTrustCategory</name>
<install-certificate-pem xmlns="urn:rdns:com:ericsson:oammodel:e →
ricsson-truststore-ext">
<name>ENM_Infrastructure_CA</name>
<pem>LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURvVENDQW9tZ0F →
3SUJBZ0lJSWU4UEI3RzYrNWd3RFFZSktvWklodmNOQVFFTEJRQXdXekVZTUJZR0ExVUUKQXd3UFJ →
VNU5YMUJMU1Y5U2IyOTBYME5CTVFzd0NRWURWUVFHRXdKVFJURVJNQThHQTFVRUNnd0lSWEpwWTN →
OegpiMjR4SHpBZEJnTlZCQXNNRmxKdmMyVnljMkpsY21kZmMzUnpkbkF6Wlc1dE1ESXdIaGNOTWp →
Fd056QTFNVFV6Ck1UTXdXaGNOTWprd056QTFNVFV6TVRNd1dqQmhNUjR3SEFZRFZRUUREQlZGVGs →
xZlNXNW1jbUZ6ZEhKMVkzUjEKY21WZlEwRXhDekFKQmdOVkJBWVRBbE5GTVJFd0R3WURWUVFLREF →
oRmNtbGpjM052YmpFZk1CMEdBMVVFQ3d3VwpVbTl6WlhKelltVnlaMTl6ZEhOMmNETmxibTB3TWp →
DQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVBBRENDCkFRb0NnZ0VCQU0zVk5uWmlmVHZ2VVZ →
aOFlvbXVLVVF1VUl4V2w0S2M5RHg2TzkxcTUrMjRSSU5mZnJQaUthNnQKNTJrUitRd2FpUDlVK1k →
1cWEvbURHT2RJMXVXbGtxZEZwTDMwQ0hhU2RrcjE1RzNsTjZFVEdqWFprSlVlcUEvTwpTQVVibUE →
zRGlibnFJRUt0UWdsRTVQMUZBejZhY243M0hpYVk2elY3UFBqamxtOTNyY1E1UFQ0ZnMwRnpHR3R →
ZClJpblowZVhVWTd5dTVjeTltRENvU0ErTXo2VVpkamJhK2oya1VYU3dNcWQ2bGZ4YWd2eTdUbGY →
rRENiUFlaVkwKRmVXZ1RYSGVmMFNIelp0UHJ4WmtPOTdsL1U4ZWVGRk5MUktQVXhpSUdVayt0RGs →
zUDE1OGlyNWZKSldQVTVCSAp2SkhNR2VRYjBGUy9yS1JRMm9BTnhURWFTQlV2UXowQ0F3RUFBYU5 →
qTUdFd0hRWURWUjBPQkJZRUZKYThxamRsCnhNS3pzZSthaXRrdllmZHBtek5ZTUE4R0ExVWRFd0V →
CL3dRRk1BTUJBZjh3SHdZRFZSMGpCQmd3Rm9BVWpraFMKWm5QaUtmQzB2MTdKQ3ZYUmFmSXNHTGt →
3RGdZRFZSMFBBUUgvQkFRREFnRUdNQTBHQ1NxR1NJYjNEUUVCQ3dVQQpBNElCQVFBWFZuV1c5NzQ →
5bjBIdEMvRjZ5RTNFbTZ2UHBtNTd3aXcxMGZaZnZvRjVZNU4xem13QmhmdXkwNzRlCmZLTUVpSXM →
xaTJhOUxCZEh5RVRwcW9jVEd4bVpra2hFRVBTaTE2NGlMTHJsblRyZHRaZThweWtLU1daa2pLUnY →
Kelp5OGZ2alhCNmdwaXExUWtZcEI1ell3VWtQdDRld0svdVNYNnozOStSQThpbm5qbXN4S3VtVDB →
kWFpkQXpMdwpiMnJ4YmF2YjMwdFQ3cWNGQVhMTksvcFk4c0ZJYVI0VmE4NStIdS9hbm0zWGJDUFl →
kemE2ZGw1NlJ0SEM3RnJHCjdwRnN2ZnFwUFpDS3JORkZydU50Z3R4STRCRzdTcE5Na1ExZG92RWI →
4MmU3bUI2MXlJL1ZVRDNHMk1vZ2dHa3YKSWxNcE44a0dDOGNGdGJmT0hnZWQvaU1WcFpVaQotLS0 →
tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==</pem>
</install-certificate-pem>
</certificates>
</truststore>
</action>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="insta →
ll-trustedCertificates-in-truststore"><ok/></rpc-reply>]]>]]><?xml version=" →
1.0" encoding="UTF-8"?>
6.8.11.13 Input NETCONF Request to Fetch Trusted Certificates Installed on Node with
Example
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="fetch-trustedCertificates-in-truststore" xmlns="urn:ietf:pa →
rams:xml:ns:netconf:base:1.0">
<get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<filter type="subtree">
<truststore xmlns="urn:ietf:params:xml:ns:yang:ietf-truststore"
xmlns:ts="urn:rdns:com:ericsson:oammodel:ericsson-truststore-ext">
</truststore>
</filter>
</get>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="fetch →
-trustedCertificates-in-truststore"><data><truststore xmlns="urn:ietf:params →
:xml:ns:yang:ietf-truststore"><certificates><name>oamTrustCategory</name><de →
scription>OAM trusted certs description</description><certificate><name>NE_O →
AM_CA</name><cert>MIAGCSqGSIb3DQEHAqCAMIACAQExADCABgkqhkiG9w0BBwEAAKCAMIIDlT →
CCAn2gAwIBAgII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==</ce →
rt></certificate><certificate><name>ENM_OAM_CA</name><cert>MIAGCSqGSIb3DQEHA →
qCAMIACAQExADCABgkqhkiG9w0BBwEAAKCAMIIDnDCCAoSgAwIBAgII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</cert></certificate><certificate><name>ENM_Infrastructure_CA</name> →
<cert>MIAGCSqGSIb3DQEHAqCAMIACAQExADCABgkqhkiG9w0BBwEAAKCAMIIDoTCCAomgAwIBAg →
II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</cert></certificate><certificate><name>ENM_PKI_Root_CA</nam →
e><cert>MIAGCSqGSIb3DQEHAqCAMIACAQExADCABgkqhkiG9w0BBwEAAKCAMIIDejCCAmKgAwIB →
AgII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</cert></certificate></certificates></tr →
uststore></data></rpc-reply>]]>]]>
6.8.11.14 Input NETCONF Request for Node Certificate Installation on Node with Example
<p12-password>{password_of_p12}</p12-password>
</install-asymmetric-key-pkcs12>
</asymmetric-keys>
</keystore>
</action>
</rpc>
]]>]]>
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="install-oamNodeCredential-in-keystore" xmlns="urn:ietf:para →
ms:xml:ns:netconf:base:1.0">
<action xmlns="urn:ietf:params:xml:ns:yang:1" xmlns:nc="urn:ietf:params:xml: →
ns:netconf:base:1.0">
<keystore xmlns="urn:ietf:params:xml:ns:yang:ietf-keystore">
<asymmetric-keys xmlns="urn:ietf:params:xml:ns:yang:ietf-keystore">
<install-asymmetric-key-pkcs12 xmlns="urn:rdns:com:ericsson:oamm →
odel:ericsson-keystore-ext">
<name>oamNodeCredential</name>
<certificate-name>oamNodeCredential</certificate-name>
<p12>MIACAQMwgAYJKoZIhvcNAQcBoIAkgASCA+gwgDCABgkqhkiG9w0B →
BwGggCSABIID6DCCBWowggVmBgsqhkiG9w0BDAoBAqCCBPswggT3MCkGCiqGSIb3DQEMAQMwGwQU →
yf01Yo+Gww9jdrboKmxtJestwGkCAwDIAASCBMi7yCvr4mPupybmLkgwNYmKe8xKCt6cYmu0zIGZ →
KGSwU1Orc1wqcztoZZWfAErOLfBLWsNINgQktnVE1ZrbXH9Rs9KoE2/krklfdDZxcSb1eXLXw3fl →
2b8DX3nzjuH8EY7v8xHIvilBCde8yTGkFzI7MZmxEH7v2gsB/TiG2+r7MCX5lF1xrVurQne+TQ1X →
ciZnsW9GIxy7k42NDSsyria577oRqYHNZnfKUB5GW6EvpPdI80NokCgutWE139srfZUfuPfGtFjh →
egmIOmPudIG0SGCX2G7AFmWZ0qEAaC1HcFdNmnuGWA4QJISUq4cP0nbfJTd34LlhI2G2l77bUojv →
tLjtv8bhOMWP1BFQO4YzQ/3K8CyPjYpzkA7x5Ohkk3hlpDcxGNAoxFJwPrZF/bEo3/WdLB9Ck11i →
GoNo1GFjfDqenGjUAKWDu07R7hrV/ubpQ3aVacRnvKyfJfiqfXgTtt7GwsK/08NE2mVxOCGLKS4Y →
pWSxMkYZlAJXAHdhwlTBlYnIa/Xu0GUKBrzEBB8v3Ra/rwlsa4GUurCIsqpjQMigBcG/KPnDSHPU →
BU7Ty+dZI3iSTe/VPr0gMMUHNXQh4ir/n8wUGoiHRQOF1Or4Xkcep2yH9JWU4IMO1lCXfc2OpSys →
4+FaDdJ/afSHJTQp84eNecCH1Afbo0Rluy6fdXzeXAH8qvC0Wkp38scWAItYVFS4bpnegVt/OYhi →
rW/9zr/tCW2jg4f86JBV50abqLTGErhmlRiIqHvURhFpJsoRjwJBrgduqbn+kJRu2EI02DInsi/F →
lCXaRFXCTgh32NFQZ6YTd30v1zJhuwR+dW2uCJiKLDSQFY5pzJ+IvhFtJKv9cHtnbKh0CpJbdfDq →
8MpTGG95PzjZq9VmOGMTErnXSSoYgmGmTIaBsKLL6f4aFCjL3TGMO3tl6geGQyvjmu+/u9Yy3pdG →
C6xff8VZn/OdMns62bz/oUMfYI5Ar5CVgaPVKaXTRzw304Ku8/rNZv0Sm6jFBI168ig/Wru473C/ →
hxMrWNkzAhMd5Vt/5GZcJxw0N7Be+hH2AaJL2Iu0kqv9nmmt97cju6flquX9meKjT/ansePztjBL →
GnFQtdBg7lCCf7Y2HfeavGiao4LVcAtMuYM1FZh5tubsvZq1S4LQo8i/ShGXkD2QXyQlp8GTeVud →
27DhL4D65pSZamewtMtRmOEOBIID6BbulU4Dr9lL0l9sByHrg927oJH8h8t9BIIBhoOVM4lJGvKq →
OJNr4q70Hs2joBudZn+wL3sf/FX8Ns7lCV5VjrirupWXf7iwKkVKCHCVzy7++ppu1WkxGHimfT3D →
kiiZ8ZizT3RCs3pOjmBTpK7NbDUylsKx2B8h/DmOtYNfh5GsD+M9trn9ET3sbFZBAaQuWS4PDI0O →
Vh4xdW1JJmySz3v8x6wxF9k5vGbuvvMSWRkUtVveASrLYttgkS7OFYqDQf/ig5sqoxItERQnl/Ea →
oWvjUmIwBFtZrRkS3f76Yw4dILT1bO5YAaXeOo1tcB1COlQEX7bRFjubxZdNdegD1YXlrS42r1gD →
E/IvIA1QVuLYhGn1Ro/UvwyOL9p3hgNeTwo2s+vGLN4KNOZzHrJKe3FmB6/02XlbHzRfaABum156 →
u09LkqEthzFYMCMGCSqGSIb3DQEJFTEWBBS36iIk5iALlGZa8/ucMBzejNzlqjAxBgkqhkiG9w0B →
CRQxJB4iAGMAbABvAHUAZAAxADUAMgAwAC0AdgBkAHUALQBvAGEAbQAAAAAAADCABgkqhkiG9w0B →
BwaggDCAAgEAMIAGCSqGSIb3DQEHATApBgoqhkiG9w0BDAEGMBsEFBeOfsl2ZFjmTRtcRiYZPwAs →
ZZ+5AgMAyACggASCA+g8DM/85tIsNP9tuwRWKN0kEMJBBX4Y/0UBOZsFeSyEXJ/HAyEEDvn2OAuL →
3G4gSrzioe2TzARAZ7D67HuPGiaddoCL331vmF0Yp0Tw290N4f8lYrWELzHNNINzXRRzlS8Fmw6C →
OblBf4I4TYMV2yXUDpzYN+jWIKd4w2wLirSePzDfHJwELN00WtXkGPwmO7I9wP+uZEZhgHXFIssr →
FAbbofwDCAhz1pCuqN1mlVheHphaBnuA4tXkxlBfUrXy3nCtRqTvcrLZeekcrkJGARXkIGStZP9o →
CfqM5anr0qMNjNzgukICdpUvwUEIcPeExR+4OHwz0r9dyCuMBYGdO3jqgEQYN99bz6AdC9+e+x1A →
EVqFvJwXEmGgSfvumP2LTMPFJEEyD0OqYvtzEDwggPGwvbb+5vZuLkx8mvtvStdmnWO/fEUwST4T →
Mesdw1J0h3qQMeFhiG/8KO3GEQmYTsDf+Z7rjRok/+rMUtcxnR1a73ySN31Q1sXeHzw9jodB3B7/ →
4WP9fdjZjMrzREvFLzSVqA6yqGP50ykdOZDklMd5mhvBS3PfKHR70N+d6WxM6sQxWRcdviOscqI4 →
ndzGOWQhBgddhG6/MNItC0nRNfvo1y70SzNqCRvZl34PCpyW7iyclJ1N1aodhUEkyMk9lEoEggPo →
NUaprp7j57mtmm3Mp8wWNLFYoMVUKWfezsEWjvEHlOX8Ln09f9+/tBv1e3VvwUoR84mAoWvDREnK →
l5E91ZGCHurjET0byg7uVhctjrIAD+UxQUOx6fnLU+uZ9DhXIlA9dSWDrhVp0IwQgJWC9k506xXJ →
x62qc8nHGyr7peVUtB55Xq3xwEh14LRPmvCkKMUXXu2/izJtkLiFohi4PPs0UrPRKdvJHcaAsr6l →
Jka+8XoFn5NIcKpGd97iXFeEwxnMuard6PE1yLV9KEvHkt9oRRTIn92evaUH05arEZvHiuwHZ6Lq →
kwQsF7GtzDjUehPK2ibsdx7Bj8+WpVsFMt818d6nQTksusmTrCkUNr68fjC7/kSGHnBwmhGZuhMp →
0fx8UCd8vdZkDJZ2vVrBkgIh86VVb+s8NvhAulLva+3gQ4QPT1QaG3rjxxfaHgZeqzyUi2wvRdsa →
47CYFI2R+tR/c+EsdG79SVf17Ww/9WAOz+i7OZNRv7Snan7dyWYMukSBOwL3jVapj0pLJmNHhqkS →
CC4jm4EDeESOBxKNuXOSgAksmhHb3ZAV9Pt0XnCusIweUc/fSN/Gp+5xF1D9ZUxKCvqdlpDaWXMr →
blWgVTTxAYrOZlbrh6ri7krEDOzlWcVE0XQ8QdL+tqUOUJ29/EJC24UGaHVOPQ9DDwSCA+jtN3vt →
lAe4bs3rI1skaFU0Np/Go7WAilcqojQGSQIEBbztKlKeHRiFoxpRjesM5BFoGhSpBOUMZiTDWve0 →
Skvif5+rs47T5HtYeoXPjw+MzUhhTIML8UkNg011s0G0pW7aq30IeABboUJAujZMH17Gk+onm/9S →
N8QYum6ruDbw7XQ3pxGRb1pf63tWyAYJc5P98pLoM66aJZ9avhQtvUKnISf7gHUXkNkOxKpXaLjV →
hfI50474W3A9JQvQa+1Ui/6JTuyUDXxodekkKIrC0hjOCKSheRj/fbhOPFLvBNxwo37WLF+fzyWm →
/QrkediCiI9nG0UPAagQZHUX7+xfV9Pkuh6VJxHG/CplNsSZYrYEQGAKBsuL6M1efzlE+tUoyzHS →
NGET53QMJzm1zhI5gTqS6ctun49NTV53sT8oTqb83s5gdByfX+2Z4rcTro1VKrqmVMiXVzPeFSfe →
YAU7MH2o/98qQi8Te3KvPRSKv97GFgo9rO2lN2xHhXHH/6MCminbyIwzc7AmBwD+MihWjSMxi/EG →
RVFnnaIgbbxI3sV6NTx27JktJPkoBepmbcDaeBrLD6mW2Oz/0so6fcl3FzN46bDUpa6zbS1pmWSt →
Wj8dOqptEAi7Kjh1VyQq1gDrG3Ap3fs2LEYf5WUGBASCA+h21/AUvR/V+sTf5/UzN5gfxGmbthuV →
eNh8F8MXp6CLEbvM4a558SvSGBCxrMfuboG+jRlevmiJPKXCfwB8FVoDikRks39zZgt+blWAoTEY →
gdOLQKyUDuiqWg7EAsi60D0qIzpMgGsE72kmZKCmjvyn5VVdJTL/T0d812U8OQ465SRIKIV//wxs →
avndvQSM+VjPtey8c1V0Nk7zakof9ovniRrsvu6EcFMkgWynZ15jVzL0isUsQ9te4sv+DgljVqVD →
VSg3SnrpSZbvoX+z7csgA22MMphvlSbYHH/PHa0lsSztUuEEe55Ci0E9f+7PXw38ThpviicrxmJK →
pt+LzuhQZQuPEoDZFwd4nUxQZkHUzbOlzYwkrKDPXOJZAwq4JmGnY1tS4FJKSVLqOfxFDL+nh9A6 →
uonPmOrYyVThgnls1HRaAmcWTvnqOfUChSUoPIT5PDcy2xQ1Dq0wF/zJAA3+Hj5PXFROXCS6zgH8 →
Gi0+I2ks0wdZUtRb8ZZG+SwwueJiqVAzFGFywEisfoVMOYYdV5mNPQ04mMls3zhV+zHB++IxaOA6 →
AM5ONmB30QOAgK3qewhTdzcfYHHYZpffVOYb5lFx2B/zfPckrQ0gbpl6twZPmktKtJUnBKdQ4Apa →
dvYhPrTtCP4aVJb6djxJmX0FAxnt61vfTBbplmqYBASCA9DV92eBoK6oUHgWSVlnrC6RrHBHVTcX →
Gx2BtTdSespPNlEkoJUlPPmjVzuWz8j4WOAXodB1eJVu2O2y9cDNYm7oJ4OEzHA4NHHwyvfIxaBo →
B1Dy2+OEs3WXxrZOdwVw3CH36XlgFf1ZedfYwR2fYT/20EARPXJ1phgRciMennoCh8NTVWZqx9lv →
0pQcO8ZUiRgcDBR1X++SbYY4gKkm2vuRJZKoyxlMS8ADahZdoqLbPZJoEKCB+WAtXx6Lz/o3DFfQ →
vTOjraXa4dMx0XzwtZEbc8fJJEPoZB+P/CY3AMycP+30k7PrSXMv/EfYZjwWqtNxqsd/SMf7XZBn →
ZIkNDKUWwcPzSrF8ZVokL5410RrjmTi6gYDlLxli+F4Vu7klfhQ1tCWRonCTbrL10tirsofGaub5 →
M/BqDgNCSPnsrBrxfMeCbT0BVfLGhw/p3SZRHaIYWqqNQ6Sv3+JAZVtJWH+ySkfO9NzuwGMwzusw →
3LyqfOC/uzkQ3mVqVR+UGQlR1Il87ZlS9h8Yx8D8aRjg4F8eS92gfFF57GaNmckMVzwk4lSEARqW →
W6coX43W94TvmNR/8vn+zL7ApwNnQgU6K7HamITC4Kt98mGkpwcTr2B38h72l7WShTtrl76E/I+H →
GOr1kw0awSkCBIIB9YapqYBaZ6Ojv1h21mnlcnlY7VDvbqPMTl7J11nJ1LZ+c67OgyetELpn4eAZ →
vJlH6D9sUd9kuFEdnb0rXQsoIbwS+IrvHeXr9YVsF/oslFpjkHlltLpOpCLsKj9Qs3NzWM8IggX9 →
yhuXJQElzPM2JPENtmCQ7sagJYUf9c13u28BisaCzqE92fFB+4VZxx4xSlU6vx5y/ZHcITPVLNZa →
N6RG2JRDPFrliyOnur6i0b3rESBGiSw6ppeFI0uDDedcfJpjiVTLK3mqbE1ylGc6veKs6H5KIzUw →
o7cGFm2fIYwgzlqBmWsY+zqBU46p3XphAbjN78YoGJxX/6AFhJBsWWVQh3pI43uSnFnBId+uJ19s →
q6SFf3IEnflMT7Ire6JMO68x5KmknKlSPfD95tX1huyNGq2eCiM9oDYaHAU23tYktmvO3CqBG0dk →
BKhWRI3eWej+q+JGostQGACevpTwEZY+njDsNnBE+p5MTDnaB4fkft8c9+Ffbwf1Gq9sJ9Np2Uzt →
/5C9pTTkGpXlqO1Wkn8/sFpPzylZDr073syH5nDY9OB5ZRE32dcQNUaFid+OQQnbPL+8L1AZdbo9 →
UyaZZkabknA5mySuWDeUwDyFqqb4D7o3tn5THsnh4l5rVmMIF2/KoKwMknNxAgAAAAAAAAAAAAAA →
AAAAAAAAADA+MCEwCQYFKw4DAhoFAAQUkIUHHNBPTqQEk26GIaN1pPxoteUEFIKk0e0MkW0Yfqhx →
bPYkMPkC+YAZAgMBkAAAAA==</p12>
<p12-password>secure</p12-password>
</install-asymmetric-key-pkcs12>
</asymmetric-keys>
</keystore>
</action>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="insta →
ll-oamNodeCredential-in-keystore"><ok/></rpc-reply>]]>]]>
6.8.11.15 Input NETCONF Request to Fetch Node Certificate Installed on Node with
Example
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="fetch →
-oamNodeCredential-in-keystore"><ok/></rpc-reply>]]>]]><?xml version="1.0" e →
ncoding="UTF-8"?>
<rpc message-id="fetch-oamNodeCredential-in-keystore" xmlns="urn:ietf:params →
:xml:ns:netconf:base:1.0">
<get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<filter type="subtree">
<keystore xmlns="urn:ietf:params:xml:ns:yang:ietf-keystore"
xmlns:ks="urn:rdns:com:ericsson:oammodel:ericsson-keystore-ext">
</keystore>
</filter>
</get>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="fetch →
-oamNodeCredential-in-keystore"><ok/></rpc-reply>]]>]]><?xml version="1.0" e →
ncoding="UTF-8"?>
<rpc message-id="OAM CMP Server Trust Store" xmlns="urn:ietf:params:xml:ns:n →
etconf:base:1.0">
<get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<filter type="subtree">
<keystore xmlns="urn:ietf:params:xml:ns:yang:ietf-keystore"
xmlns:ks="urn:rdns:com:ericsson:oammodel:ericsson-keystore-ext">
</keystore>
</filter>
</get>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="fetch →
-oamNodeCredential-in-keystore"><data><keystore xmlns="urn:ietf:params:xml:n →
s:yang:ietf-keystore"><asymmetric-keys><asymmetric-key><name>oamNodeCredenti →
al</name><algorithm>rsa2048</algorithm><public-key>MIIBIjANBgkqhkiG9w0BAQEFA →
AOCAQ8AMIIBCgKCAQEAi4n3ebwL7qjcusoR/ok+TOFAIhXj
ciWXAHnBRMREjOYQP37AbbdIMvSmlxmQCDL1MIr+qkLsrznAyDu2zB8ZXDGGqeWYLp4o1PGy
/RbmqoQWu7Wrd7J5eRlS2QBzlk0qLN5U1UXe76CuoRIeFE160KFnqttrMXko8ZwjEBX/nQpu
3o9fc+RHwmIlBP5uB+KRS652zPZTaSdnXSG3T9f6WGVTMtVM0VG5k77iJa2FNpE61HItK0HR
rD68qR/74UA8IOTd+VIm13HVAGi5BREN6dfqlf0BNXNO3SVodonYqIkM4mRWHhUZv9XkxznY
G7fjEHiEnIl00Myk6IRAtmZVXQIDAQAB</public-key><private-key>MIIEvQIBADANBgkqhk →
iG9w0BAQEFAASCBKcwggSjAgEAAoIBAQCLifd5vAvuqNy6yhH+iT5M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</private-key><certificates><certifi →
cate><name>oamNodeCredential</name><cert>MIAGCSqGSIb3DQEHAqCAMIACAQExADCABgk →
qhkiG9w0BBwEAAKCAMIIDlDCCAnygAwIBAgII
OxnsurqGOUYwDQYJKoZIhvcNAQELBQAwVTESMBAGA1UEAwwJTkVfT0FNX0NBMQswCQYDVQQG
EwJTRTERMA8GA1UECgwIRXJpY3Nzb24xHzAdBgNVBAsMFlJvc2Vyc2Jlcmdfc3RzdnAzZW5t
MDIwHhcNMjEwODA1MTIyOTA2WhcNMjMwODA1MTIyOTA2WjBdMRowGAYDVQQDDBFjbG91ZDE1
MjAtdmR1LW9hbTELMAkGA1UEBhMCU0UxETAPBgNVBAoMCEVyaWNzc29uMR8wHQYDVQQLDBZS
b3NlcnNiZXJnX3N0c3ZwM2VubTAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
i4n3ebwL7qjcusoR/ok+TOFAIhXjciWXAHnBRMREjOYQP37AbbdIMvSmlxmQCDL1MIr+qkLs
rznAyDu2zB8ZXDGGqeWYLp4o1PGy/RbmqoQWu7Wrd7J5eRlS2QBzlk0qLN5U1UXe76CuoRIe
FE160KFnqttrMXko8ZwjEBX/nQpu3o9fc+RHwmIlBP5uB+KRS652zPZTaSdnXSG3T9f6WGVT
MtVM0VG5k77iJa2FNpE61HItK0HRrD68qR/74UA8IOTd+VIm13HVAGi5BREN6dfqlf0BNXNO
3SVodonYqIkM4mRWHhUZv9XkxznYG7fjEHiEnIl00Myk6IRAtmZVXQIDAQABo2AwXjAdBgNV
HQ4EFgQUt+oiJOYgC5RmWvP7nDAc3ozc5aowDAYDVR0TAQH/BAIwADAfBgNVHSMEGDAWgBQK
l6gGx2UYexdea1MJGjhsTq/6UDAOBgNVHQ8BAf8EBAMCA6gwDQYJKoZIhvcNAQELBQADggEB
AFJ6+aQqAM+UvUAuOMcUbmomH6OaDimpIRz+q/XR+9TNLakHDTup9yZ57EuxXx6CwPbCG+jB
6GOqFnM3NUCVPkRAd3nAdc5cG2RFajp60UCSuMWXcOksbaJ3i6RSU0VrvD615j2UrP/Sls1u
6FrbRkaOu2zJ8I0j+BmBnMGDzK7uVok7++JV3cpOb6I0z+bBtF27zWdizRyQrqI8H9ULzddu
f+6m/y3XMkLyr/PSuRgxiK22SFx8iw6yalDLYb6RERqZyFLWcD+SpWx72ePBa9t5Zgqb01oy
I0uhYWiPdRCx+F1EKUr7rmPTKegGIF5KzAvdUdzNihvUuSVOmHiq6jEwggOVMIICfaADAgEC
Agg0mTsyrkVRXDANBgkqhkiG9w0BAQsFADBbMRgwFgYDVQQDDA9FTk1fUEtJX1Jvb3RfQ0Ex
CzAJBgNVBAYTAlNFMREwDwYDVQQKDAhFcmljc3NvbjEfMB0GA1UECwwWUm9zZXJzYmVyZ19z
dHN2cDNlbm0wMjAeFw0yMTA3MDUxNTMxMjhaFw0yOTA3MDUxNTMxMjhaMFUxEjAQBgNVBAMM
CU5FX09BTV9DQTELMAkGA1UEBhMCU0UxETAPBgNVBAoMCEVyaWNzc29uMR8wHQYDVQQLDBZS
b3NlcnNiZXJnX3N0c3ZwM2VubTAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA
wZemZlPVl23YPzgD0Qw22nGJ8A7BHox2woeSYWmuRjljuQfu2UIsiQcVYxieRwP/2l8MQB3O
Kk6YZTKRu5VC931FwsWdFGjuxw+hjkTL2TEsF98KKVebm+LSJG10zXuHDQy9pMxK1/fgC7jw
OSdbPFyFtmFo6ednpw0prDLVx+CFukfXhya3Os6+lB69yrwX+pLkk8i5zsXHRTNUlS6Nu/Ep
Itsp2n4UkHv+3JNQnViLHKPusJB0ifAP6qgzmKENTVrtVhWDuvCM8EBw7TGK0mME9wbbrxNx
2bhRstZg/T1PFkbBmofTpWh9IPC6mPJPBDTntp+fOIg7zPVUds2pyQIDAQABo2MwYTAdBgNV
HQ4EFgQUCpeoBsdlGHsXXmtTCRo4bE6v+lAwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAW
gBSOSFJmc+Ip8LS/XskK9dFp8iwYuTAOBgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQAD
ggEBABeEWSufE9HhQCl7LpGGLeLR1MnnF7fvc0Rvy+ATg1SBfLFTliPHoh3wnbzEvZ1+P3LT
4utz5StdGenHuD093ak3kpgWcJA6Q8/b53WXPRb23fN8F1oiZ9SMFl7s4EHUGa+U/xtPwjMc
MDgyQW6vK4LrZzO7QnmmLqbmNyC/ITBCOwKiYvvZE+FFrnnsYhmHWpnzUeFhhKQDOpHvQrAe
f7FWFI3UY7F5QUWMIyuK1Grn/2OLGpvXVmdiwCcqKmOK4CgyNPoB5w4Q9EpUaxEAh2HodRWh
Vi/P7mi6JYl5J/Sn7ihZ4gSELV3o5kak2HQdTcNQqEMkzjScZbSIBQVCJnAwggN6MIICYqAD
AgECAghlPRMXTwLtCDANBgkqhkiG9w0BAQsFADBbMRgwFgYDVQQDDA9FTk1fUEtJX1Jvb3Rf
Q0ExCzAJBgNVBAYTAlNFMREwDwYDVQQKDAhFcmljc3NvbjEfMB0GA1UECwwWUm9zZXJzYmVy
Z19zdHN2cDNlbm0wMjAeFw0yMTA3MDUxNTMxMjJaFw0zMTA3MDUxNTMxMjJaMFsxGDAWBgNV
BAMMD0VOTV9QS0lfUm9vdF9DQTELMAkGA1UEBhMCU0UxETAPBgNVBAoMCEVyaWNzc29uMR8w
HQYDVQQLDBZSb3NlcnNiZXJnX3N0c3ZwM2VubTAyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAj7v2pyafNsKmFq9blz9B2zEJNpegR409p2fSvkFEQtQnuK2Sb3R7z/yyLA70
z79Xnwuw5m7wZNAPtYL/5YA9o+GMt9Gkyo2pzE/WmiOQqPCqmoktC1DBv5tNSbnn2VNNCdDb
9uxjPv/8KSfQPNNFKl2enNuMapXGuDurdv+4MIVB3LGQd/O0YrO9iTA/awBObPZtqtQy1us6
ZjkcvYgjAPvafc3Zqe1Ui1Zb6W5WMZLfFwdeR2DslZWhJR6xAGUODdlHdo+1Uxzo10qwbwUO
KfnSFb0KZ6nnbz7vtmOBLpRo+UyJeBYGX8tmoxx/ZVvvN3lkb9/JgP9wH/gMvbVk1wIDAQAB
o0IwQDAdBgNVHQ4EFgQUjkhSZnPiKfC0v17JCvXRafIsGLkwDwYDVR0TAQH/BAUwAwEB/zAO
BgNVHQ8BAf8EBAMCAQYwDQYJKoZIhvcNAQELBQADggEBAA2TYz8P3j8gSUC0NKKk4ySENOL7
k0dOriZ/6PlgSODKE3xaDV0jw2C0iMzBwHsW/GRlcMHQVGlnsHYY3pSMUqQZKt2wOTcbmizg
gSOfRy8784xqzdUfWKV9Rpagdct2Ap2moKhm1hHHfsidk4OMJpHadVuHpCNZFs/L2/UTExXd
+Nr2iXwIP9x6eFVZUDmNmj+5gyPHq8hF4BnIy+bt97hmkeH2p2Dtp04zy9pG4fbQ5jD6ybgy
nQE7Z3gYmMUk3uI5S4gp980dZKN+W0rtzQaaeYGQn5Gg6uE1yveP3zxNf2QWossBehPDRAs0
QTv55SDAISErIofj3OX/TMlRO28AADEAAAAAAAAA</cert></certificate></certificates> →
</asymmetric-key></asymmetric-keys></keystore></data></rpc-reply>]]>]]>
6.8.11.16 Input NETCONF Request to Install LDAP Configuration on Node with Example
<bind-password>{bindPassword}</bind-password>
</simple-authenticated>
<user-base-dn>{baseDn}</user-base-dn>
</security>
<options>
<timeout>5</timeout>
<enable-referrals>false</enable-referrals>
</options>
</ldap>
</system>
</config>
</edit-config>
</rpc>
]]>]]>
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="configure-s →
ecure-ldap">
<edit-config>
<target>
<running />
</target>
<config xmlns:xc="urn:ietf:params:xml:ns:netconf:base:1.0">
<system xmlns="urn:ietf:params:xml:ns:yang:ietf-system">
<ldap xmlns="urn:rdns:com:ericsson:oammodel:ericsson-system-ext" →
>
<server>
<name>external</name>
<tcp>
<address>2001:1b70:8231:0001:0000:0000:0000:100e</addre →
ss>
<ldaps>
<port>1636</port>
</ldaps>
</tcp>
</server>
<security>
<tls />
<simple-authenticated>
<bind-dn>cn=ProxyAccount_16,ou=proxyagent,ou=com,dc=sts →
vp3enm02-72,dc=com</bind-dn>
<bind-password>TLnH6ywUvNHWrAvdeHzZzswS</bind-password>
</simple-authenticated>
<user-base-dn>dc=stsvp3enm02-72,dc=com</user-base-dn>
</security>
<options>
<timeout>5</timeout>
<enable-referrals>false</enable-referrals>
</options>
</ldap>
</system>
</config>
</edit-config>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="confi →
gure-secure-ldap"><ok/></rpc-reply>]]>]]>
6.8.11.17 Input NETCONF Request to Fetch LDAP Configuration Installed on Node with
Example
Example
-------------------------------------------------------------------------
/* Previous Netconf content part is ignored to improve readability */
-------------------------------------------------------------------------
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc message-id="fetch-secure-ldap-details" xmlns="urn:ietf:params:xml:ns:ne →
tconf:base:1.0">
<get xmlns="urn:ietf:params:xml:ns:netconf:base:1.0">
<filter type="subtree">
<system xmlns="urn:ietf:params:xml:ns:yang:ietf-system"
xmlns:ts="urn:ietf:params:xml:ns:yang:ietf-system">
<ldap xmlns="urn:rdns:com:ericsson:oammodel:ericsson →
-system-ext">
</ldap>
</system>
</filter>
</get>
</rpc>
]]>]]><?xml version="1.0" encoding="UTF-8"?>
<rpc-reply xmlns="urn:ietf:params:xml:ns:netconf:base:1.0" message-id="fetc →
h-secure-ldap-details"><data><system xmlns="urn:ietf:params:xml:ns:yang:ietf →
-system"><ldap xmlns="urn:rdns:com:ericsson:oammodel:ericsson-system-ext"><s →
erver><name>external</name><tcp><address>2001:1b70:8231:1::100e</address><ld →
aps><port>1636</port></ldaps></tcp></server><security><simple-authenticated> →
<bind-dn>cn=ProxyAccount_16,ou=proxyagent,ou=com,dc=stsvp3enm02-72,dc=com</b →
ind-dn><bind-password>TLnH6ywUvNHWrAvdeHzZzswS</bind-password></simple-authe →
nticated><user-base-dn>dc=stsvp3enm02-72,dc=com</user-base-dn></security><op →
tions><timeout>5</timeout><enable-referrals>false</enable-referrals></option →
s></ldap></system></data></rpc-reply>]]>]]>
6.8.12 Offline Enrollment Procedure for Node Types (vCSCF, vSAPC, vEME,
vMTAS, vSBG, vIPWorks, HSS-FE, vHSS-FE, and NeLS)
There are two offline enrollment options for the nodes:
Prerequisites
in case of OAM
If End Entity is not in the mentioned format, it is not possible to reissue the
certificate for End Entity.<node-name>-oam<node-name>-oam
— Refer to PKCS #10 (RFC 2986) for more information on the CSR.
— A valid End Entity must be created in ENM PKI before performing the Offline
Enrollment for the node. In this case, End Entity is a node.
For creation of the End Entity, see the section <Entity Management Tasks of
the document ENM Public Key Infrastructure System Administrator Guide",
Reference [8].
The user must transfer the P12 file to SFTP server to complete the offline
enrollment procedures. See the corresponding Node CPI for the same.
Note: For both CSR and Container-based Offline Enrollment, after the
certificate is installed successfully on the node, it is recommended to
perform revocation of old certificate in ENM PKI.
For LDAP configuration, see the LDAP Administrative Tasks on page 276.
For a node certificate revocation, see the section PKI Revocation Management
Task of the document ENM Public Key Infrastructure System Administrator
Guide", Reference [8].
6.8.12.1 Add ENM CAs to Node Types (vCSCF, vSAPC, vEME, vMTAS, vSBG, vIPWorks,
HSS-FE, vHSS-FE, and NeLS)
This section describes how to install trusted certificates on node type: vCSCF,
vSAPC, vEME, vMTAS, vSBG, vIPWorks, HSS-FE ,vHSS-FE, and NeLS.
Prerequisites
— PKI_Administrator role to access the pkiadm commands.
Steps
1. Launch ENM CLI and run the commands to obtain the Trust Distribution
Point Service (TDPS) URL for each of the four required ENM CA certificates.
These certificates are used to download the ENM CA certificates to the node.
ssh <NE_USER_NAME>@<NE_IP_ADDRESS>
CEMSS07# /opt/com/bin/cliss
ManagedElement=CEMSS07,SystemFunctions=1,SecM=1,CertM=1
Example
(CertM=1)>installTrustedCertFromUri http://141.137.236.235:8093/pki →
-ra-tdps/ca_entity/ENM_PKI_Root_CA/c63197edd6ca617/active/ENM_PKI_R →
oot_CA NULL NULL
(config)>dn -m CertM
ManagedElement=CEMSS07,SystemFunctions=1,SecM=1,Ce →
rtM=1
(config-CertM=1)>installTrustedCertFromUri ENM_PKI →
_Root_CA.pem <URL_password> <CA_fingerprint>
true
(config-CertM=1)>show
localFileStorePath="certificates"
userLabel="Certificate Management"
reportProgress
actionId=0
actionName="installTrustedCertFromUri"
additionalInfo
"TrustedCertificate=13"
progressInfo=""
progressPercentage=100
result=SUCCESS
5. Execute the show command on the CertM MO to display the installed trusted
certificates on the node.
(config-CertM=1)>TrustCategory=1
(config-TrustCategory=1)>trustedCertificates="ManagedElement=CEMSS07,SystemF →
unctions=1,SecM=1,CertM=1,TrustedCertificate=13"
(config-TrustCategory=1)>commit -s
Navigate to TrustCategory and execute the show command to verify if all the
certificates are added.
For ExternalCA procedure, see the section Configuring ENM PKI System with
External CA Support of the document ENM Public Key Infrastructure System
Administrator Guide, Reference [8].
Prerequisites
— PKI_Aministrator role to access the pkiadm commands.
Steps
— Status: Enabled
Note: This role is not in use for CUDB but ENM requires that at least
one role must be assigned.
— COM Target Groups for System Administrator can be NONE for CUDB.
Example
/cluster/home/cudb/security/config/certificates/ca/
ENM_PKI_Root_CA.pem
9. Configure the remote LDAP server if it does not use default LDAP ports, like,
for example, 636 for LDAPS or 389 for STARTTLS tlsMode.
Example
1636 or 1389 for ENM
/opt/ericsson/cudb/OAM/support/bin/cudbConfigureLdapAA --acsupdate →
register
10. Check if connection to ENM LDAP server is working fine and the CA is as
expected.
Example
For example:
At the end of the procedure, the Router 6000 series node is added in ENM and is
synchronized with TLS.
End Entity Creation and Credential Generation for E2E Offline Enrollment for
Router 6000 Family
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) that
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Prerequisites
— The node is configured with the required configuration before adding the
node in ENM. See the document Router 6672 Preliminary Configuration,
Reference [31].
[local]router6000#show pki
number of node-credential: 1
name: oamNodeCredential
number of trusted-certificate: 4
name: 1
subject-name: CN=NE_OAM_CA, C=SE, O=ERICSSON, OU=BUCI_DUAC_NAM
serial number: 033EDC6ED9BE693D
name: 2
subject-name: CN=ENM_PKI_Root_CA, C=SE, O=ERICSSON, OU=BUCI_DUAC_NAM
serial number: 2C3F10C3A2527865
name: 3
subject-name: CN=ENM_Infrastructure_CA, C=SE, O=ERICSSON, OU=BUCI_DUAC_NAM
serial number: 74F4A95A1B066F7D
name: 4
subject-name: CN=ENM_OAM_CA, C=SE, O=ERICSSON, OU=BUCI_DUAC_NAM
serial number: 2F740B4641200115
number of capabilities: 1
name: 1
number of vendor-credential: 1
name: 1
number of trust-category: 1
name: oamTrustCategory
number of enrollment-authority: 1
name: 1
number of enrollment-server-group: 1
name: 1
[local]router6000# config
[local]router6000(config)# no netconf tls server node-credential
[local]router6000(config)# no netconf tls server trust-category oamTrustCate →
gory
[local]router6000(config)# commit
[local]router6000(config)# no pki node-credential oamNodeCredential
[local]router6000(config)# no pki trust-category oamTrustCategory
[local]router6000(config)# no pki enrollment-authority 1
[local]router6000(config)# no pki enrollment-server-group 1
[local]router6000(config)# commit
[local]router6000(config)# end
[local]router6000# pki remove-trusted-cert 1
[local]router6000# pki remove-trusted-cert 2
[local]router6000# pki remove-trusted-cert 3
[local]router6000# pki remove-trusted-cert 4
Steps
The highlighted profile in the command output is the default profile used
when OAM Enrollment is performed for Router 6000 nodes.
The End Entities are created starting from an XML file. The template for the
XML file follows:
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true<Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
<SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
</EntityInfo>
</Entity>
</Entities>
Note: The NetworkElementID is the identifier that the user uses at the
end of this procedure, when the Router 6000 Node is added in ENM.
The following is an example of the XML used to generate the End Entity for
the Router6000 with NetworkElementID=RouterOfflineEnrollment.
The End Entity must be present in the list of End Entities. The End
Entity must be created with name NetworkElementID-oam and its status
is NEW. In the following example, EE is related to Router6000 node with ID
RouterOfflineEnrollment.
— NE_OAM_CA
— ENM_OAM_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
[local]Ericsson#config
[local]Ericsson(config)#pki node-credential RouterOfflineEnroll-oam
[local]Ericsson(pki-node-credential)#subject-name 'CN=RouterOfflineEnroll-oam, O=ERICSSON, C=SE, O →
U=BUCI_DUAC_NAM'
[local]Ericsson(pki-node-credential)#key-info rsa_2048
[local]Ericsson(pki-node-credential)#commit
[local]Ericsson(pki-node-credential)#end
The subject-name and key-info must be the same as the ENM entity
created in Step 2, Step 3, and Step 4.
12. Install the node certificate after the CSR was signed by CA.
The PEM file downloaded at Step 10 must be uploaded to a server
(10.10.10.1 in the following example) and installed on the node using the
following command.
[local]router6000#configure
[local]router6000(config)#context local
[local]router6000(config-ctx)#administrator COMUser password ********
[local]router6000(config-administrator)#role NetconfPlatformAdministrator
[local]router6000(config-administrator)#commit
[local]router6000#config
[local]router6000(config)# pki trust-category oamTrustCategory trusted-certificate 1,2,3,4
[local]router6000(config)#commit
Transaction committed.
[local]router6000(config)#end
[local]router6000#config
[local]router6000(config)#netconf tls server admin-state enabled
[local]router6000(config)#netconf tls server trust-category oamTrustCategory
[local]router6000(config)#netconf tls server node-credential RouterOfflineEnroll-oam
[local]router6000(config)#commit
Transaction committed.
[local]router6000(config)#end
— Turn on CM supervision:
End Entity Creation and Credential Generation for E2E Offline Enrollment for
Router 6000 Family
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) that
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Prerequisites
— The node has the required configuration before adding the node in ENM, see
the document Router 6672 Preliminary Configuration, Reference [31].
Steps
The highlighted profile is the default profile used when OAM Enrollment is
performed for Router 6000 nodes.
The End Entities are created starting from an XML file. The following is the
template for the XML file:
Following is an example of XML used to generate the End Entity for the
Router6000 with NetworkElementID=RouterOfflineEnrollment:
The End Entity must be present in the list of End Entities. The End Entity
must be created with name NetworkElementID-ipsec and its status is
NEW. In the following example, EE related to Router6000 node with ID
RouterOfflineEnrollment.
— NE_IPsec_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
[local]Ericsson#config
[local]Ericsson(config)#pki node-credential ipsecNodeCredential
[local]Ericsson(pki-node-credential)#subject-name 'CN=RouterOfflineEnroll-ip →
sec, O=ERICSSON, C=SE, OU=BUCI_DUAC_NAM'
[local]Ericsson(pki-node-credential)#key-info rsa_2048
[local]Ericsson(pki-node-credential)#commit
[local]Ericsson(pki-node-credential)#end
The subject-name and key-info must be the same as the ENM entity
created in Step 2, Step 3, and Step 4.
12. Install the node certificate after the CSR is signed by CA:
Results
The IPsec enrollment is successful.
At the end of the procedure, the Router 6000 series node is added in ENM and is
synchronized with TLS.
6.8.15.1.1 End Entity Creation and Credential Generation for Online Certificate Enrollment
on Router 6000
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) that
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
See ER6000 node CPI Public Key Infrastructure for required node prerequisites
and configuration details.
Prerequisites
Steps
1. To enable TLS on the node, access the node through Node CLI, and execute
the following commands in config mode:
<Nodes>
<Node>
<NodeFdn>NetworkElement-FDN</NodeFdn>
<EntityProfileName>DUSGen2OAM_CHAIN_EP</EntityProfileName>
<EnrollmentMode>CMPv2_VC</EnrollmentMode>
<KeySize>RSA_2048</KeySize>
</Node>
</Nodes>
7. Click the link generated as result of step Step 6 to check the enrollment job
status.
8. When the node has successfully enrolled, switch it from SSH to TLS.
c. Turn on CM supervision:
6.8.15.2.1 End Entity Creation and Credential Generation for Online Certificate Enrollment
on RadioNode
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) which
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8].
Prerequisites
Steps
The highlighted profile is the default profile used when OAM Enrollment is
performed for Radio Nodes.
The End Entities are created starting from an XML file. The following is the
template for the XML file:
Template.xml
</Entity>
</Entities>
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Radio Node is added in ENM.
The following file is an example of XML file used to generate the End
Entity for the RadioNode with Network Element ID=G2RBS_27.
EE-G2RBS_27-oam.xml
Drag and drop the XML file created in Step 2 into the ENM CLI. To create the
End Entity, run the following command:
Example
EE Subject DN:
CN=<EntityInfo.Subject.COMMON_NAME.value>,C=<EntityInfo.Subject.COUNTRY_NAME →
.value>,O=<EntityInfo.Subject.ORGANIZATION.value>,OU=<EntityInfo.Subject.ORG →
ANIZATION_UNIT.value>,
EE Subject DN:
CN=G2RBS_27-oam,C=SE,O=ERICSSON,OU=BUCI DUAC NAM
If ENM_PKI_Root_CA is self-signed:
— Calculate SHA1 FingerPrint of ENM_PKI_Root_CA using Openssl:
>pkiadm extcalist
From this table, it is possible to retrieve the ExtRoot CA. For example, if from
step b the ENM_PKI_Root_CA has been signed by O=TCS, C=IN, OU=DLF,
CN=PrimeTowerIntermediateCA, then the ExtRoot CA name is O=TCS,
This procedure is only applicable for OAM Enrollment. Do not use for IPsec
Enrollment.
Upon enrollment, the Fronthaul node is added in ENM and synchronized with
TLS.
End Entities (EE) of the PKI System are the end users who get credentials from
the ENM PKI System. They use it for communication with other ENM systems.
End Entities must be created in the PKI system.
To generate credentials each End Entity is mapped to an Entity Profile (EP) that
defines the Certificate Authority (CA).
For more information about Entity and Profiles, see Public Key Infrastructure
System of the ENM Public Key Infrastructure System Administrator Guide,
Reference [8].
Prerequisites
Steps
1. Access the node through Node CLI and execute the following commands in
config mode to enable TLS on the node.
5. Click the link generated as result of the preceding step to check the
enrollment job status.
6. When the node has successfully enrolled, switch it from SSH to TLS.
b. Set transportProtocol in
FrontHaul6000ConnectivityInformationMO to TLS:
c. Turn on CM supervision:
Prerequisites
Steps
2. Click the link generated as result of Step 1 to check the enrollment job status.
3. When the node has successfully enrolled, switch it from SSH to TLS.
c. Turn on CM supervision:
Steps
a. List all the Entity Profiles already present in ENM PKI system.
Template.xml
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi →
:noNamespaceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
</EntityInfo>
</Entity>
</Entities>
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Controller6610 node is added in ENM.
The NetworkElementID is the identifier that the user must use at the
end of this procedure when the Controller6610 Node is added in ENM.
hrzgiacie00007-oam.xml
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noN →
amespaceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>hrzgiacie00007-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>hrzgiacie00007-oam</Value>
</SubjectField>
</Subject>
</EntityInfo>
</Entity>
</Entities>
a. Verify that the End Entity has been created by listing all the End
Entities in the ENM PKI system:
ii. Select the required entity and click Issue to download the
certificate in P12 format.
Result: The entity status is "Active" with one certificate assigned to it.
a. HRZGIACIE00007>acl nodecredential
Example
3. Drag and drop the XML file created above into the ENM CLI and run the
following command to configure LDAP.
a. Stop CM Supervision.
e. Start CM Supervision.
This section describes the online enrollment procedure for ESC node.
Prerequisites
— The user has access to the ENM CLI as an authorized user.
Steps
Example
Sample XML file: OAM_Certificate_Realnode.xml
<Nodes>
<Node>
<NodeFdn><node Name></NodeFdn>
</Node>
</Nodes>
4. Click the link generated as result of Step 3 to check the enrollment job status.
— If the job status is COMPLETED and workflow status is SUCCESS, the
enrollment of the node is done. Continue to the next step.
5. Switch the node from SSH to TLS, when the node has successfully enrolled.
6. Turn on CM supervision.
This section described the offline enrollment procedure for ESC node.
The operator must generate the node credential and trusted credentials
manually, and install them on the node, with the offline procedure.
Prerequisites
— The user has access to the ENM CLI as an authorized user.
Steps
Table 11
Id Profile Name Profile Type
74 DUSGen2OAM_CHAIN_EP ENTITY_PROFILE
The End Entities are created starting from an XML file. The XML template is
the following:
</Category>
<EntityInfo>
<Name>NetworkElementID-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-oam</Value>
</SubjectField>
</Subject>
</EntityInfo>
</Entity>
</Entities>
Save the XML file. Suggested name for the file is EE_NetworkElementID-
oam.xml.
The End Entity must be present in the list of End Entities. The End Entity
must be created with name NetworkElementID-oam and its status is NEW.
Example
In this example, the End Entity is related to ESC node with
NetworkElementID ESC_220-oam.
Note: ESC_220 is the node name which is used to perform the offline
enrollment.
— ENM_OAM_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
Run the following commands in the ENM CLI to download the credentials in
PEM format:
The certificates must be moved to server that can be reached via SFTP from
node and this server is used in the next step.
Note: User "root" and path /root/tmp are for example purpose only.
Change them as per the SFTP user configuration on SFTP server.
#Node> startTransaction t
#Node> createMO t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,NodeCred →
ential=1
#Node> setMOAttribute t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,No →
deCredential=1 subjectName "CN='imenode'"
#Node> setMOAttribute t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,No →
deCredential=1 keyInfo RSA_2048
#Node> commit t
#Node> endt t
ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,NodeCredential=1; certific →
ateState="NOT_VALID_YET"
OperationSucceeded
The CSR is signed by CA after the PEM file is generated using the CSR.
11. Install the node certificate after the CSR was signed by CA.
a. Turn of CM supervision.
d. Turn on CM supervision.
This section describes the online enrollment procedure for SCU node.
Prerequisites
— The user has access to the ENM CLI as an authorized user.
— In the following, SCU_124 is the <node Name> used for the examples.
Steps
<Nodes>
<Node>
<NodeFdn>SCU_124</NodeFdn>
</Node>
</Nodes>
4. Click the link generated as result of Step 3 to check the enrollment job status.
5. Switch it from SSH to TLS with the following steps, when the node has
successfully enrolled.
c. Turn on CM supervision.
This section described the offline enrollment procedure for SCU node.
The node credential and trusted credentials must be generated manually and
then installed on the node in an offline manner.
Prerequisites
— The user has access to the ENM CLI as an authorized user.
Steps
The template for the XML file is the following. In the template,
NEtworkElementID needs to be replaced with the name of the node.
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>SCU_72-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>SCU_72-oam</Value>
</SubjectField>
</Subject>
</EntityInfo>
</Entity>
</Entities>
The End Entity must be present in the list of End Entities. The End Entity
must be created with name NetworkElementID-oam and its status is NEW.
Example
In this example, the End Entity is related to SCU node with ID SCU_72-oam.
— ENM_OAM_CA
— ENM_Infrastructure_CA
— ENM_PKI_Root_CA
Run the following commands in the ENM CLI to download the credentials in
PEM format:
Note: User root and path /root/tmp are for example purpose only.
Change them as per the SFTP user configuration on SFTP server.
#Node> startTransaction t
#Node> createMO t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,NodeCred →
ential=1
#Node> setMOAttribute t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,No →
deCredential=1 subjectName "CN='imenode'"
#Node> setMOAttribute t ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,No →
ManagedElement=1,SystemFunctions=1,SecM=1,CertM=1,NodeCredential=1; certific →
ateState="NOT_VALID_YET"
OperationSucceeded
The CSR is signed by CA after the PEM file is generated using the CSR.
12. Install the node certificate after the CSR was signed by CA.
a. Turn of CM supervision.
d. Turn on CM supervision.
6.8.20 End to End Enrollment for Citizens Broadband Radio Service Domain
Coordinator Standalone (CBRS DC SA)
The operator starts the CBRS DC SA enrollment through the CMPv2 protocol,
obtaining the certificate from PKI-RA.
This procedure is only applicable for OAM enrollment. Do not use for IPsec
enrollment.
Prerequisites
Steps
— CBRS DC SA configuration.
At the end of the procedure, the connectivity is possible between ENM and CBRS
DC SA.
Sample output:
Figure 41
Sample output:
Figure 42
These are the default profiles used when OAM Enrollment is performed for
CBRS DC SA.
</Subject>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<CertificateProfile Name="ENM_System_HTTPS_SBI_CP" />
<TrustProfile Name="CBRS_DC_SA_TP" />
<KeyUsage>
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyU →
sageType>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUs →
ageType>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsage →
Type>
</KeyUsage>
</EntityProfile>
</Profiles>
</Subject>
<OTP><REPLACE WITH - user defined one time password></OTP>
<OTPCount>5</OTPCount>
<Issuer>
<Name>ENM_OAM_CA</Name>
</Issuer>
</EntityInfo>
<OTPValidityPeriod>1440</OTPValidityPeriod>
</Entity>
</Entities>
The <CBRS_DC_SA_<ID>> is the identifier that the user must use at the
end of this procedure, when the CBRS DC SA is connected in ENM. <ID>
is defined by the operator.
The ID must clearly indicate the name of the ENM managing this CBRS
DC SA instance.
— Create a one time password to be used for this End Entity and set this as
the value for the <OTP> tag. This same password must be used again in
Step 12.
Note: This one time password expires 24 hours after the End Entity
is created. If it has not been used by then, another End Entity
needs to be created because this password gets used during the
installation of CBRS DC SA.
Save the created XML file. The suggested name for the file is
EE_CBRS_DC_SA_<ID>-oam.xml. For example, EE_CBRS_DC_SA_ENM_ATH_1-
oam.xml.
Example
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-OAM</Name>
</Category>
<EntityInfo>
<Name>CBRS_DC_SA_ENM_ATH_1-oam</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI_DUAC_NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>CBRS_DC_SA_ENM_ATH_1-oam</Value>
</SubjectField>
</Subject>
<OTP>password</OTP>
<OTPCount>5</OTPCount>
<Issuer>
<Name>ENM_OAM_CA</Name>
</Issuer>
</EntityInfo>
<OTPValidityPeriod>1440</OTPValidityPeriod>
</Entity>
</Entities>
The End Entity must be created with name <CBRS_DC_SA_<ID>-oam> and its
status is NEW.
Replace the values in <> with the following values taken from
EE_CBRS_DC_SA<ID>-oam.xml:
COMMON_NAME=<EntityInfo.Subject.COMMON_NAME.value>
COUNTRY_NAME=<EntityInfo.Subject.COUNTRY_NAME.value>
ORGANIZATION=<EntityInfo.Subject.ORGANIZATION.value>
ORGANIZATION_UNIT=<EntityInfo.Subject.ORGANIZATION_UNIT.value>
10. Go back to ENM CLI and fetch CMPv2 issuing Certificate Authority Name:
b. Copy the subjectDN and use the same value as input for certificate-
authority.
The subjectDN is the value shown in the Subject column of the table
returned in the previous command.
12. Create CMPv2 configuration JSON file to load into CBRS DC SA.
The file must be named eric-sec-certm-deployment-
configuration.json.
Sample of eric-sec-certm-deployment-configuration.json:
{
"ca-certs": [
{
"name": "cbrsDcSaEnmCaCerts",
"pem": "-----BEGIN CERTIFICATE-----\nMIIDaDCCAlCgAwIBAgIIO5KzyAd →
2XGowDQYJKoZIhvcNAQELBQAwUjEYMBYGA1UEAwwPRU5NX1BLSV9Sb290X0NBMREwDwYDVQQKDAh →
FUklDU1NPTjEWMBQGA1UECwwNQlVDSV9EVUFDX05BTTELMAkGA1UEBhMCU0UwHhcNMjIwNTA5MjI →
xNTU5WhcNMzIwNTA5MjIxNTU5WjBSMRgwFgYDVQQDDA9FTk1fUEtJX1Jvb3RfQ0ExETAPBgNVBAo →
MCEVSSUNTU09OMRYwFAYDVQQLDA1CVUNJX0RVQUNfTkFNMQswCQYDVQQGEwJTRTCCASIwDQYJKoZ →
IhvcNAQEBBQADggEPADCCAQoCggEBAJO+cbLpRy7yE6oeZWdkrg4vF9gXAZmbxOVRqMVd7RSBq8I →
0h7VUeBeZkvbnEr0hoO6aJdLbs2LiM/V4M+abkf0jNd8BpbDmF67Qef/fH82sQRj87B+tCKslZoZ →
k5oPNDthFo951wH6qtqsAGC0C4MbKGdV6AZ1bk5wNBABKvdMeedV+N4cIxkXnLx+iD0V/SzVl0+T →
xTjjEwY+1mCt6vHd4ey8bh2wYVOo6txOeuWl5ISCUCWJi9fKjay9RXwh6oUgxcb0iou6tKGV+Zyu →
Fxh34Bnun3S7EqAmqM1sCYUyCSSrcgDT2ro9ax1PtlWefRnFHBPWe0QuhTHslP7Q/P5ECAwEAAaN →
CMEAwHQYDVR0OBBYEFMHf0xR9fj0kNyLfRfP4BrwZg4jUMA8GA1UdEwEB/wQFMAMBAf8wDgYDVR0 →
PAQH/BAQDAgEGMA0GCSqGSIb3DQEBCwUAA4IBAQBCEHeCv3ZOTn5Wy8XQJ28ojIYmoHZdejYBOLM →
wk35UJiPRsgrBE9F2qsOljGfRLAqQPPIQgm0HW6qlLI5ie6Fj91Cb9eVs/yl+TXUTYaDLnAL6RU8 →
EEL3uEsepO73qLfYnUcq6IpyBfX0mBlf6wPQoM70Vaksxf3dzFT51MJ1hmVXjhH7JfB9X5PTPKXz →
9hmIMks4BfLnmxVfXIQIPAngMSlfN8mV8OhFM+KayByrqgO9R9a1qr3m1o1NvX9rDEizCcVVPVga →
v96DLUwvHiFYDjaLttfW5xEFrAObPa9ZnewQLS20rN0CH/zwEJ90jQu47dxttzmSwHNlpbDjDLBe →
L\n-----END CERTIFICATE-----"
}
],
"certificate-authorities": {
"certificate-authority": [
{
"name": "CN=ENM_OAM_CA"
}
]
},
"cmp-server-groups": {
"cmp-server-group": [
{
"name": "cmpGroupCbrsDcSaEnm",
"cmp-server": [
{
"name": "cmpServerCbrsDcSaEnm",
"ca-certs": "cbrsDcSaEnmCaCerts",
"uri": "http://<IP>:8091/pkira-cmp/synch",
"certificate-authority": "C=SE,OU=BUCI_DUAC_NAM,O=ER →
ICSSON,CN=ENM_OAM_CA",
"priority": 1,
"ra-mode-enabled": false
}
]
}
]
},
"enrollments": [
{
"name": "cbrs-dc-sa-enm",
"certificate-name": "cbrs-dc-sa-enm",
"algorithm": "rsa2048",
"cmp-server-group": "cmpGroupCbrsDcSaEnm",
"subject": "CN=CBRS_DC_SA_ENM_ATH_1-oam,C=SE,O=ERICSSON,OU=BUCI_ →
DUAC_NAM",
"subject-alternative-names": [
"DNS:eric-cbrs-dc-sa-hostname.com"
],
"password": "password",
"trusted-certs": "cbrsPubsDcSaEnmCaCerts"
}
],
"enrollment-retry-timeout": 60
}
Results
Once all the steps of the enrollment procedure are completed a new End Entity
is created in ENM. A Kubernetes Secret, created using the JSON configuration file
(created in [12]) that contains the credentials generated by ENM, exists in the
same namespace in the CBRS DC SA Kubernetes cluster.
Note: For all the nodes, which support offline enrollment, alarm must be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
It is required that the user:
— Has knowledge on ENM.
Overview
The offline procedure is based on three main steps:
The Certificate Profile can be created using XML file or using PKI Profile
Management application.
Steps
The Certificate Profile is created from an XML file. The template for the XML
is the following:
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="31">
<Name>ECDSA</Name>
<KeySize>384</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="24">
<Name>RSA</Name>
<KeySize>4096</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<CertificateValidity>P2Y</CertificateValidity>
<Issuer>
<PublishCertificatetoTDPS>false</PublishCertificatetoTDPS>
<CertificateAuthority>
<Id>17</Id>
<Name>NE_OAM_CA</Name>
<IsRootCA>false</IsRootCA>
<CAStatus>NEW</CAStatus>
<PublishToCDPS>false</PublishToCDPS>
<IsIssuerExternalCA>false</IsIssuerExternalCA>
</CertificateAuthority>
</Issuer>
<SubjectUniqueIdentifier>false</SubjectUniqueIdentifier>
<IssuerUniqueIdentifier>false</IssuerUniqueIdentifier>
<SkewCertificateTime>PT30M</SkewCertificateTime>
<CertificateExtensions>
<CertificateExtension xsi:type="BasicConstraints"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<IsCA>false</IsCA>
</CertificateExtension>
<CertificateExtension xsi:type="AuthorityKeyIdentifier"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<AuthorityKeyIdentifierType>SUBJECT_KEY_IDENTIFIER</Authorit →
yKeyIdentifierType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectKeyIdentifier"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<KeyIdentifier>
<KeyIdentifier>IssuerKeyIdentifier</KeyIdentifier>
<Algorithm Id="44">
<Name>160-BIT_SHA-1</Name>
<Type>MESSAGE_DIGEST_ALGORITHM</Type>
<Supported>true</Supported>
<AlgorithmCategory>KEY_IDENTIFIER</AlgorithmCategory →
>
</Algorithm>
</KeyIdentifier>
</CertificateExtension>
<CertificateExtension xsi:type="CRLDistributionPoints"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV4/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV6/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_DNS/pki-cdps?ca_name=$CANAME& →
amp;ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
</CertificateExtension>
<CertificateExtension xsi:type="KeyUsage"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageT →
ype>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageTy →
pe>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectAltName"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
</SubjectAltNameField>
</CertificateExtension>
</CertificateExtensions>
<SubjectCapabilities>
<SubjectField>
<Type>COMMON_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SURNAME</Type>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>LOCALITY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>STATE</Type>
</SubjectField>
<SubjectField>
<Type>STREET_ADDRESS</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
</SubjectField>
<SubjectField>
<Type>DN_QUALIFIER</Type>
</SubjectField>
<SubjectField>
<Type>TITLE</Type>
</SubjectField>
<SubjectField>
<Type>GIVEN_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SERIAL_NUMBER</Type>
</SubjectField>
</SubjectCapabilities>
</CertificateProfile>
</Profiles>
The following file is an example of XML file used to generate the Certificate
Profile for the MINI-LINK Network Element:
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="29">
<Name>ECDSA</Name>
<KeySize>256</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="23">
<Name>RSA</Name>
<KeySize>3072</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="22">
<Name>RSA</Name>
<KeySize>2048</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="33">
<Name>ECDSA</Name>
<KeySize>512</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="31">
<Name>ECDSA</Name>
<KeySize>384</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="24">
<Name>RSA</Name>
<KeySize>4096</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<CertificateValidity>P2Y</CertificateValidity>
<Issuer>
<PublishCertificatetoTDPS>false</PublishCertificatetoTDPS>
<CertificateAuthority>
<Id>17</Id>
<Name>NE_OAM_CA</Name>
<IsRootCA>false</IsRootCA>
<CAStatus>NEW</CAStatus>
<PublishToCDPS>false</PublishToCDPS>
<IsIssuerExternalCA>false</IsIssuerExternalCA>
</CertificateAuthority>
</Issuer>
<SubjectUniqueIdentifier>false</SubjectUniqueIdentifier>
<IssuerUniqueIdentifier>false</IssuerUniqueIdentifier>
<SkewCertificateTime>PT30M</SkewCertificateTime>
<CertificateExtensions>
<CertificateExtension xsi:type="BasicConstraints" xmlns:xsi="htt →
p://www.w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<IsCA>false</IsCA>
</CertificateExtension>
<CertificateExtension xsi:type="AuthorityKeyIdentifier" xmlns:xs →
i="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<AuthorityKeyIdentifierType>SUBJECT_KEY_IDENTIFIER</Authorit →
yKeyIdentifierType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectKeyIdentifier" xmlns:xsi= →
"http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<KeyIdentifier>
<KeyIdentifier>IssuerKeyIdentifier</KeyIdentifier>
<Algorithm Id="44">
<Name>160-BIT_SHA-1</Name>
<Type>MESSAGE_DIGEST_ALGORITHM</Type>
<Supported>true</Supported>
<AlgorithmCategory>KEY_IDENTIFIER</AlgorithmCategory →
>
</Algorithm>
</KeyIdentifier>
</CertificateExtension>
<CertificateExtension xsi:type="CRLDistributionPoints" xmlns:xsi →
="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV4/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV6/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_DNS/pki-cdps?ca_name=$CANAME& →
amp;ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
</CertificateExtension>
<CertificateExtension xsi:type="KeyUsage" xmlns:xsi="http://www. →
w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageT →
ype>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageTy →
pe>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectAltName" xmlns:xsi="http: →
//www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
</SubjectAltNameField>
</CertificateExtension>
</CertificateExtensions>
<SubjectCapabilities>
<SubjectField>
<Type>COMMON_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SURNAME</Type>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>LOCALITY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>STATE</Type>
</SubjectField>
<SubjectField>
<Type>STREET_ADDRESS</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
</SubjectField>
<SubjectField>
<Type>DN_QUALIFIER</Type>
</SubjectField>
<SubjectField>
<Type>TITLE</Type>
</SubjectField>
<SubjectField>
<Type>GIVEN_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SERIAL_NUMBER</Type>
</SubjectField>
</SubjectCapabilities>
</CertificateProfile>
</Profiles>
or
See the sections Code Example of Certificate Profile and Certificate Profile
Inputs in the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8] for further information on Certificate Profile Creation
using Certificate Profile Creation XML.
The End Entity Profile can be created using XML file or using PKI Profile
Management application.
Steps
The End Entity Profile is created from an XML file. The template for the XML
is the following:
The following file is an example of XML file used to generate the End Entity
Profile for the MINI-LINK Network Element:
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<StringValue>0.0.0.0</StringValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<CertificateProfile Name="MINI-LINK_Outdoor_CP" />
<TrustProfile Name="OAM_NE_CHAIN_TP" />
<KeyUsage>
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageType>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageType>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</KeyUsage>
</EntityProfile>
</Profiles>
or
The End Entity must be present in the list of End Entity Profiles.
See the sections Create End Entity Profiles, Entity Profile Inputs and Code
Example of Entity Profile in the document ENM Public Key Infrastructure
Steps
1. Launch PKI Profile Management, choose PKI Entity Profile from Create PKI
Profile dropdown selection.
The newly created Entity Profile would be available in the list of entity
profiles listed by executing the above CLI command.
Steps
1. Prepare and save the XML File for the End Entity Creation.
A different End Entity must be created for each MINI-LINK node.
The End Entities are created from an XML file. The template for the XML is
the following:
Template.xml
<CertificateExpiryNotificationDetails>
<NotificationSeverity>WARNING</NotificationSeverity>
<PeriodBeforeExpiry>P90D</PeriodBeforeExpiry>
<FrequencyOfNotification>P4D</FrequencyOfNotification>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>MAJOR</NotificationSeverity>
<PeriodBeforeExpiry>P60D</PeriodBeforeExpiry>
<FrequencyOfNotification>P2D</FrequencyOfNotification>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>CRITICAL</NotificationSeverity>
<PeriodBeforeExpiry>P30D</PeriodBeforeExpiry>
<FrequencyOfNotification>P1D</FrequencyOfNotification>
</CertificateExpiryNotificationDetails>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>UNDEFINED</Name>
</Category>
<EntityInfo>
<Name>NetworkElementId</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementId-oam</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString">
<StringValue>NodeIPAddress</StringValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
</EntityInfo>
</Entity>
</Entities>
The <Network Element Id> is the identifier that the user must use at
the end of this procedure when the MINI-LINK Node is added in ENM.
The Network Element Id is the identifier that the user must use at the
end of this procedure when the MINI-LINK Node is added in ENM.
See the section Code Example of End Entity of ENM Public Key
Infrastructure System Administrator Guide, Reference [8].
The following file is an example of XML file used to generate the End
Entity for the MINI-LINK with Network Element ID = ML6352_102
ML6352_102.xml
<Entities
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance →
" xsi:noNamespaceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificat →
etoTDPS>
<EntityProfile Name="MINI-LINK_Outdoor_EP"/>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>MINOR</NotificationSeve →
rity>
<PeriodBeforeExpiry>P180D</PeriodBeforeExpiry →
>
<FrequencyOfNotification>P7D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>WARNING</NotificationSe →
verity>
<PeriodBeforeExpiry>P90D</PeriodBeforeExpiry>
<FrequencyOfNotification>P4D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>MAJOR</NotificationSeve →
rity>
<PeriodBeforeExpiry>P60D</PeriodBeforeExpiry>
<FrequencyOfNotification>P2D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>CRITICAL</NotificationS →
everity>
<PeriodBeforeExpiry>P30D</PeriodBeforeExpiry>
<FrequencyOfNotification>P1D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>UNDEFINED</Name>
</Category>
<EntityInfo>
<Name>ML6352_102</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>ML6352_102-oam</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString →
">
<StringValue>10.42.141.102</Strin →
gValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
</EntityInfo>
</Entity>
</Entities>
The End Entity is created, with name Network Element ID, and its status
is NEW. The following example shows an End Entity related to MINI-LINK
node ML6352_102.
Steps
a. For GUI based process to download CSR, see the section Managing Web
Server Security of respective Node CPI in Cloud Native ENM Upgrade
Instructions, References [37], [38], [39], [40], [41].
b. For CLI based process to download CSR, see the section Managing Web
Server Security of respective Node CPI in Cloud Native ENM Upgrade
Instructions, References [37], [38], [39], [40], [41].
2. Generate the certificate.
Drag and drop the CSR file onto ENM CLI and run the following ENM CLI
command to generate the End Entity credential in PEM format.
Syntax
Example
Note: For all the nodes, which support offline enrollment, alarm must be
configured for certificate expiry notification to enable the user to renew
the certificate.
Prerequisites
It is required that the user:
— Has knowledge on ENM.
Overview
The offline procedure is based on three main steps:
The Certificate Profile can be created using XML file or using PKI Profile
Management application.
Steps
The Certificate Profile is created from an XML file. The template for the XML
is the following:
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="22">
<Name>RSA</Name>
<KeySize>2048</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="33">
<Name>ECDSA</Name>
<KeySize>512</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="31">
<Name>ECDSA</Name>
<KeySize>384</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>2.23.42.9.11.4.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<KeyGenerationAlgorithm Id="24">
<Name>RSA</Name>
<KeySize>4096</KeySize>
<Type>ASYMMETRIC_KEY_ALGORITHM</Type>
<OID>1.2.840.113549.1.1.1</OID>
<Supported>true</Supported>
</KeyGenerationAlgorithm>
<CertificateValidity>P2Y</CertificateValidity>
<Issuer>
<PublishCertificatetoTDPS>false</PublishCertificatetoTDPS>
<CertificateAuthority>
<Id>17</Id>
<Name>NE_OAM_CA</Name>
<IsRootCA>false</IsRootCA>
<CAStatus>NEW</CAStatus>
<PublishToCDPS>false</PublishToCDPS>
<IsIssuerExternalCA>false</IsIssuerExternalCA>
</CertificateAuthority>
</Issuer>
<SubjectUniqueIdentifier>false</SubjectUniqueIdentifier>
<IssuerUniqueIdentifier>false</IssuerUniqueIdentifier>
<SkewCertificateTime>PT30M</SkewCertificateTime>
<CertificateExtensions>
<CertificateExtension xsi:type="BasicConstraints" xmlns:xsi="htt →
p://www.w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<IsCA>false</IsCA>
</CertificateExtension>
<CertificateExtension xsi:type="AuthorityKeyIdentifier" xmlns:xs →
i="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<AuthorityKeyIdentifierType>SUBJECT_KEY_IDENTIFIER</Authorit →
yKeyIdentifierType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectKeyIdentifier" xmlns:xsi= →
"http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<KeyIdentifier>
<KeyIdentifier>IssuerKeyIdentifier</KeyIdentifier>
<Algorithm Id="44">
<Name>160-BIT_SHA-1</Name>
<Type>MESSAGE_DIGEST_ALGORITHM</Type>
<Supported>true</Supported>
<AlgorithmCategory>KEY_IDENTIFIER</AlgorithmCategory →
>
</Algorithm>
</KeyIdentifier>
</CertificateExtension>
<CertificateExtension xsi:type="CRLDistributionPoints" xmlns:xsi →
="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV4/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV6/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_DNS/pki-cdps?ca_name=$CANAME& →
amp;ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
</CertificateExtension>
<CertificateExtension xsi:type="KeyUsage" xmlns:xsi="http://www. →
w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageT →
ype>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageTy →
pe>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectAltName" xmlns:xsi="http: →
//www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
</SubjectAltNameField>
</CertificateExtension>
</CertificateExtensions>
<SubjectCapabilities>
<SubjectField>
<Type>COMMON_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SURNAME</Type>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>LOCALITY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>STATE</Type>
</SubjectField>
<SubjectField>
<Type>STREET_ADDRESS</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
</SubjectField>
<SubjectField>
<Type>DN_QUALIFIER</Type>
</SubjectField>
<SubjectField>
<Type>TITLE</Type>
</SubjectField>
<SubjectField>
<Type>GIVEN_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SERIAL_NUMBER</Type>
</SubjectField>
</SubjectCapabilities>
</CertificateProfile>
</Profiles>
The following file is an example of XML file used to generate the Certificate
Profile for the MINI-LINK Network Element:
<Critical>true</Critical>
<IsCA>false</IsCA>
</CertificateExtension>
<CertificateExtension xsi:type="AuthorityKeyIdentifier" xmlns:xs →
i="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<AuthorityKeyIdentifierType>SUBJECT_KEY_IDENTIFIER</Authorit →
yKeyIdentifierType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectKeyIdentifier" xmlns:xsi= →
"http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<KeyIdentifier>
<KeyIdentifier>IssuerKeyIdentifier</KeyIdentifier>
<Algorithm Id="44">
<Name>160-BIT_SHA-1</Name>
<Type>MESSAGE_DIGEST_ALGORITHM</Type>
<Supported>true</Supported>
<AlgorithmCategory>KEY_IDENTIFIER</AlgorithmCategory →
>
</Algorithm>
</KeyIdentifier>
</CertificateExtension>
<CertificateExtension xsi:type="CRLDistributionPoints" xmlns:xsi →
="http://www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV4/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_IPV6/pki-cdps?ca_name=$CANAME →
&ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
<DistributionPoint>
<DistributionPointName>
<FullName>http://$FQDN_DNS/pki-cdps?ca_name=$CANAME& →
amp;ca_cert_serialnumber=$CACERTSERIALNUMBER</FullName>
</DistributionPointName>
</DistributionPoint>
</CertificateExtension>
<CertificateExtension xsi:type="KeyUsage" xmlns:xsi="http://www. →
w3.org/2001/XMLSchema-instance">
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageT →
ype>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageTy →
pe>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectAltName" xmlns:xsi="http: →
//www.w3.org/2001/XMLSchema-instance">
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
</SubjectAltNameField>
</CertificateExtension>
</CertificateExtensions>
<SubjectCapabilities>
<SubjectField>
<Type>COMMON_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SURNAME</Type>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>LOCALITY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>STATE</Type>
</SubjectField>
<SubjectField>
<Type>STREET_ADDRESS</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
</SubjectField>
<SubjectField>
<Type>DN_QUALIFIER</Type>
</SubjectField>
<SubjectField>
<Type>TITLE</Type>
</SubjectField>
<SubjectField>
<Type>GIVEN_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SERIAL_NUMBER</Type>
</SubjectField>
</SubjectCapabilities>
</CertificateProfile>
</Profiles>
or
See the sections Code Example of Certificate Profile and Certificate Profile
Inputs in the document ENM Public Key Infrastructure System Administrator
Guide, Reference [8] for further information on Certificate Profile Creation
using Certificate Profile Creation XML.
The End Entity Profile can be created using XML file or using PKI Profile
Management application.
Steps
1. Prepare and save XML File for End Entity Profile Creation.
A single End Entity Profile can be used for all MINI-LINK nodes.
The End Entity Profile is created from an XML file. The template for the XML
is the following:
The following file is an example of XML file used to generate the End Entity
Profile for the MINI-LINK Network Element:
emaLocation="ProfilesSchema.xsd">
<EntityProfile Name="MINI-LINK_Indoor_EP">
<Modifiable>true</Modifiable>
<Category>
<Modifiable>true</Modifiable>
<Name>UNDEFINED</Name>
</Category>
<Subject>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>?</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<StringValue>0.0.0.0</StringValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<CertificateProfile Name="MINI-LINK_Indoor_CP" />
<TrustProfile Name="OAM_NE_CHAIN_TP" />
<KeyUsage>
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageType>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageType>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</KeyUsage>
</EntityProfile>
</Profiles>
or
Verify that the End Entity Profile has been created by listing all the End
Entity Profiles in the ENM PKI system:
The End Entity must be present in the list of End Entity Profiles.
See the sections Create End Entity Profiles, Entity Profile Inputs and Code
Example of Entity Profile in the document ENM Public Key Infrastructure
System Administrator Guide, Reference [8] for further information on End
Entity Profile Creation using XML.
Steps
1. Launch PKI Profile Management, choose PKI Entity Profile from Create PKI
Profile dropdown selection.
The newly created Entity Profile would be available in the list of entity
profiles listed by executing the above CLI command.
Steps
1. Prepare and save the XML File for the End Entity Creation.
A different End Entity must be created for each MINI-LINK node.
The End Entities are created from an XML file. The template for the XML is
the following:
Template.xml
The <Network Element Id> is the identifier that the user must use at
the end of this procedure when the MINI-LINK Node is added in ENM.
The Network Element Id is the identifier that the user must use at the
end of this procedure when the MINI-LINK Node is added in ENM.
See the section Code Example of End Entity of ENM Public Key
Infrastructure System Administrator Guide, Reference [8].
The following file is an example of XML file used to generate the End
Entity for the MINI-LINK with Network Element ID =ML6691_LK-140:
ML6691_LK-140.xml
<Entities
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance →
" xsi:noNamespaceSchemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificat →
etoTDPS>
<EntityProfile Name="MINI-LINK_Indoor_EP"/>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>MINOR</NotificationSeve →
rity>
<PeriodBeforeExpiry>P180D</PeriodBeforeExpiry →
>
<FrequencyOfNotification>P7D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>WARNING</NotificationSe →
verity>
<PeriodBeforeExpiry>P90D</PeriodBeforeExpiry>
<FrequencyOfNotification>P4D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>MAJOR</NotificationSeve →
rity>
<PeriodBeforeExpiry>P60D</PeriodBeforeExpiry>
<FrequencyOfNotification>P2D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<CertificateExpiryNotificationDetails>
<NotificationSeverity>CRITICAL</NotificationS →
everity>
<PeriodBeforeExpiry>P30D</PeriodBeforeExpiry>
<FrequencyOfNotification>P1D</FrequencyOfNoti →
fication>
</CertificateExpiryNotificationDetails>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>UNDEFINED</Name>
</Category>
<EntityInfo>
<Name>ML6691_LK-140</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>ML6691_LK-140-oam</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<Critical>false</Critical>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString →
">
<StringValue>10.198.100.140</Stri →
ngValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
</EntityInfo>
</Entity>
</Entities>
The End Entity is created, with name Network Element ID, and its status
is NEW. The following example shows an End Entity related to MINI-LINK
node ML6691_LK-140.
Steps
It describes the security levels used to implement the security solution for
O&M access in CPP based NEs.
— At Security Level 2, secure protocols are used towards the NEs. CORBA
interface is secured and authentication is achieved by the use of certificates
that have been issued to the NE from a Certificate Authority (IIOP over
SSL, data encryption).
Prerequisites
— Create Node Credentials - To create node credentials, see the Create Node
Credentials on page 21.
— User must be a Node Security Administrator to trigger the security level set
command.
— If CMPv2_VC enrollment mode has been selected, then make sure that Vendor
Credentials are imported to ENM.
Steps
secadm sl set
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, the node is switched to Security Level 2 and if the workflow status
is ERROR, see the document ENM Security Management Troubleshooting
Guide, Reference [10], for more details.
3. Retrieve the security level on the node to verify the activation status.
Run the ENM CLI command:
secadm sl get
secadm sl get
Results
If the command is triggered successfully, the following message is displayed:
Note: Local AA feature is supported for RNC, ERBS, RBS, MGW, MRS,
and Evo8300 type of CPP nodes. The following table describes the
supported node versions.
Table 13
NE Type Local RBAC Automatic Local
Supported Node RBAC Enable
Versions From Supported Node
Versions From
RNC W18.Q4 W20.Q1
ERBS L19.Q1 L20.Q1
RBS W19.Q1 W20.Q1
MGW 6.10.4.0 6.11.2.0
MRS 6.10.4.0 6.11.2.0
Evo8300 C19.Q3 C20.Q1
The purpose of the CPP Task Profiles is to authorize users on CPP nodes. Users
are assigned with CPP Task Profiles and granted permissions to execute the
commands on CPP nodes based on the Task Profiles. The node uses the LAAD
files to authenticate and manage the different levels of authorization for different
users, while accessing it over SSH /SFTP/CORBA.
LAAD files must be distributed to the nodes before configuring the Local AA on
the node. All users associated with CPP Task Profiles are part of the LAAD files.
If Local AA is deactivated on the node (basic mode), node uses node password
file to authenticate the users. By default, node is in deactivated mode (basic
mode).
This feature provides operator to enable Local AA on the node, which involves:
Prerequisites
— LAAD Files can contain at most 50 users, out of which two are predefined
users, nmsadm and secureuser, and other 48 users are configurable.
nmsadm is required for mediation components and this user is used for
authentication when mediation connects to the node during the secure
CORBA communication. There is no password for nmsadm user and it is
present only in Authorization file.
Note: Secure user is used by AMOS during the execution of COLI commands
whereas actual user who opened AMOS session is used for CRUD
operations. To use actual user for CLI commands, follow the steps on
every new or refreshed user interface session:
amos <nodename>
Example:
uv amos_enm_accountlookup=0
Example:
LIENB0511> uv amos_enm_accountlookup=0
Steps
This can be done through RESTful User Management and User Management
application.
See the section Distribution of LAAD Files on CPP-Based NEs on page 266.
This step describes the procedure for activating and deactivating Local AA
on the node.
See the sections Activate Local AA on page 267 and Deactivate Local AA on
page 271.
See the section Get Security Level Status on page 274 for more details.
Note: Local AA feature is supported for RNC, ERBS, RBS, MGW, MRS, and
Evo8300 nodes.
The LAAD consists of two files, one is authentication file and the other is
authorization file. These files are generated and signed, and the signed files are
distributed to the node. As part of distribution of LAAD files, trust certificates
for LAAD are distributed and installed on the node with trust category as
LOCAL_AA_DB_FILE_SIGNERS. If trusted certificates are already distributed to
nodes, then the distribution of trusted certificates is skipped and continues with
LAAD files distribution to nodes.
To generate the LAAD files for CPP node, initially LAAD files are prepared using
the required information, for example, usernames, task profiles, and hashed
passwords for the given node. Using this information, Local Authentication and
Authorization files are generated.
— The Authentication file contains the usernames mapped with the respective
hashed passwords.
— The Authorization file contains the usernames mapped with the list of
corresponding task profiles of that user.
After generating the files, they are signed and installed on the nodes.
Prerequisites
— Node must be in sync with ENM.
Actors
Authorized for: NodeSecurity_Administrator, Administrator, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
Results
If the command is triggered successfully, the following message is displayed in
ENM CLI:
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, the LAAD files are distributed to the nodes.
Upon activating the Local AA mode, the node uses the LAAD files for
authentication and authorization.
Prerequisites
— The supported node types are RNC, ERBS, RBS, MGW, MRS, RNC EVO 8200,
and RNC EVO 8300 nodes.
Steps
1. Connect to the node and check UserAAPolicy status using the ENM CLI
command secmode -s.
--End settings------------------------------------------------
secmode -u c
secmode -s
See Step 4 to verify user authentication and authorization with the newly
distributed LAAD files.
Example
$ secmode -u c
Command returned: SECMODE_OK
Command executed successfully
$ secmode -s
Security configuration settings:
Access method Current security mode
--------------------------------------------------------------
TelnetFtpServers secure, node internal Telnet and FTP servers are OFF →
.
TargetMonitor secure, node Target Monitor is OFF.
DbgServerUdpLnh secure, Debug server and UDP Linkhandler are OFF.
FileXferClient secure, node internal file transfer client uses SFTP →
.
CorbaSecurity secure, corba security is ON.
WebServer unsecure, HTTP server is ON.
UserAAPolicy enhanced, LAAD file with multiple Local Authenticati →
on and Authorization users is activated in SL1 and SL2
OperationalSecLevel level 2
ConfiguredSecLevel level 2
--End settings------------------------------------------------
$
$ secmode -s
Security configuration settings:
Access method Current security mode
--------------------------------------------------------------
TelnetFtpServers secure, node internal Telnet and FTP servers are OFF →
.
TargetMonitor secure, node Target Monitor is OFF.
DbgServerUdpLnh secure, Debug server and UDP Linkhandler are OFF.
FileXferClient secure, node internal file transfer client uses SFTP →
.
CorbaSecurity secure, corba security is ON.
WebServer unsecure, HTTP server is ON.
secmode -u e
secmode -u c
secmode -s
See Step 4 to verify user authentication and authorization with the newly
distributed LAAD files.
Example
$ secmode -u e
Command returned: SECMODE_OK
Command executed successfully
Please confirm the setting by giving the secmode -u c command, from the secu →
rity user.
$ secmode -s
Security configuration settings:
Access method Current security mode
--------------------------------------------------------------
TelnetFtpServers secure, node internal Telnet and FTP servers are OFF →
.
TargetMonitor secure, node Target Monitor is OFF.
DbgServerUdpLnh secure, Debug server and UDP Linkhandler are OFF.
FileXferClient secure, node internal file transfer client uses SFTP →
.
CorbaSecurity secure, corba security is ON.
WebServer unsecure, HTTP server is ON.
UserAAPolicy unconfirmed, LAAD file with multiple Local Authentic →
ation and Authorization users is activated in SL1 and SL2
OperationalSecLevel level 2
ConfiguredSecLevel level 2
--End settings------------------------------------------------
$ secmode -u c
Command returned: SECMODE_OK
Command executed successfully
$ secmode -s
Security configuration settings:
Access method Current security mode
-------------------------------------------------------------
TelnetFtpServers secure, nde internal Telnet and FTP servers are OFF.
TargetMonitor secure, node Target Monitor is OFF.
DbgServerUdpLnh secure, Debug server and UDP Linkhandler are OFF.
FileXferClient secure, node internal file transfer client uses SFTP →
.
CorbaSecurity secure, corba security is ON.
WebServer unsecure, HTTP server is ON.
4. Verify if the user present in the distributed LAAD files can log on the node
successfully, if the UserAAPolicy status is in enhanced mode.
Example
ssh [email protected]
Upon deactivating the Local AA mode, the node does not use the LAAD files for
authentication and authorization.
Prerequisites
— The supported node types are RNC, ERBS, RBS, MGW, MRS, RNC EVO 8200,
and RNC EVO 8300 nodes.
Steps
1. Connect to the node and check UserAAPolicy status using the COLI
command secmode -s.
secmode -u b
secmode -s
$ secmode -u b
Command returned: SECMODE_OK
UserAAPolicy changed from enhanced to basic, a new password must be set →
.
Enter new password: <Enter desired Password>
Re-enter new password: <Confirm desired Password>
Command executed successfully
[PNTC-5266@ieatlms4898 ~]$ ssh [email protected]
[email protected]'s password: <desired Password>
Welcome to OSE Shell OSE5.8.
$ secmode -s
Security configuration settings:
Access method Current security mode
--------------------------------------------------------------
TelnetFtpServers secure, node internal Telnet and FTP servers ar →
e OFF.
TargetMonitor secure, node Target Monitor is OFF.
DbgServerUdpLnh secure, Debug server and UDP Linkhandler are OF →
F.
FileXferClient secure, node internal file transfer client use →
s SFTP.
CorbaSecurity secure, corba security is ON.
WebServer unsecure, HTTP server is ON.
UserAAPolicy basic, One Node Password is used in SL1 and SL2
OperationalSecLevel level 2
ConfiguredSecLevel level 2
--End settings------------------------------------------------
After deactivation of Local AA on the node, all the previously available users
are deleted on the node. To create a user with OAM ADMIN role on the node,
do the following steps:
Example:
Figure 43
b. Log on the node with the credentials username: initadmin and
password: init as shown in example.
c. Set the username and password as Secure user credentials in ENM for
the OAM ADMIN role user so that use cases in ENM using SSH does not
break.
Example:
$ secmode -u b
Command returned: SECMODE_OK
UserAAPolicy changed from enhanced to basic, node users must be configu →
red.
Command executed successfully
--End settings------------------------------------------------
Table 14
Local AA Mode Description
ACTIVATED LAAD file with multiple Local
Authentication and Authorization
users is activated in SL1 and SL2.
DEACTIVATED Node Password is used in SL1 and
SL2.
UNCONFIRMED LAAD file with multiple Local
Authentication and Authorization
users is activated in SL1 and SL2 and
is in unconfirmed state.
Prerequisites
— Nodes must exist in the system.
Steps
secadm sl get
Results
The security level on the node and the Local AA status details are displayed with
node name. See online help for more details.
LDAP Configure
LDAP Configure can be applied to the Network Elements that support
Centralized User Authentication & Authorization to LDAP protocol, providing
required setting to LDAP Client.
Ad a consequence of this use case, a new proxy account is created on ENM LDAP
server with its password. These credentials are provided to the Network Element
to authenticate itself before having User Authentication & Authorization through
LDAP protocol.
Note: In case that the default password length is not supported by the node,
see the section Downsize Proxy Account Password Length on page 290.
This option is provided to configure the LDAP on Network Elements that are not
in CM Sync.
Prerequisites
Steps
Note: The LDAP settings on node can be verified with the command:
Example
LdapConfiguration.xml
</Node>
</Nodes>
In this example, the command gets the current status of the job:
Table 16
Job Com Job Job Job Job Node Workf Workf Workf Workf Workf
Id man User Statu Start End Nam low low low low low
d Id s Date Date e Statu Start Durat Detai Resul
s Date ion ls t
ac93 LDA admi RUN 2020 N/A LTE0 RUN 2020 N/A N/A N/A
3cfc- P_CO nistr NIN -09-2 1dg2 NIN -09-2
0f5f- NFIG ator G 9 ERBS G 9
4971 URA 10:0 0004 10:0
-980f TION 6:41 0 6:41
-0b0
1f8ff
dcec
Note: — Repeat the get command until the Job Status is COMPLETED.
When the reconfigure LDAP action is running, the existing bindDN account (set
using LDAP Configure command) is deleted and a new account and password are
set.
This allows the user to handle a scenario where a proxy agent account can have
been compromised without requiring the security administrator to delete the
account, before the network element can be reconfigured.
Prerequisites
Steps
Note: The LDAP settings on node can be verified with the command:
Example
LdapReconfiguration.xml
</Node>
</Nodes>
In this example, the command gets the current status of the job:
Table 17
Job Com Job Job Job Job Node Workf Workf Workf Workf Workf
Id man User Statu Start End Nam low low low low low
d Id s Date Date e Statu Start Durat Detai Resul
s Date ion ls t
ac93 LDA admi RUN 2020 N/A LTE0 RUN 2020 N/A N/A N/A
3cfc- P_CO nistr NIN -09-2 1dg2 NIN -09-2
0f5f- NFIG ator G 9 ERBS G 9
4971 URA 10:0 0004 10:0
-980f TION 6:41 0 6:41
-0b0
1f8ff
ffff
Note: — Repeat the get command until the Job Status is COMPLETED.
Run the ENM CLI command with manual option (--manual | --ml):
To disable Weak Ciphers in LDAP communications, see the section Disable Weak
Ciphers in ENM on page 446.
Prerequisites
To perform online enrollment, see LDAP Configuration for Router 6000 Family on
page 281.
Steps
1. Prerequisite verification:
2. Configure LDAP:
<Nodes>
<Node>
<nodeFdn>NetworkElement=NodeName</nodeFdn>
<tlsMode>LDAPS</tlsMode>
<userLabel>ENM</userLabel>
<useTls>true</useTls>
</Node>
</Nodes>
b. Drag and drop the XML file created above into the ENM CLI app and
run the following command to configure LDAP:
a. Stop CM Supervision:
e. Start CM Supervision:
Prerequisites
— BSC node credentials created under ENM with Secure user equal to BSC node
Troubleshooter (TS) user and empty ldapApplication user.
Steps
b. Verify that node credentials have been created under ENM, with
Secure user equal to node Troubleshooter (TS) user with the
command:
a. Use the following file to issue the OAM certificate on BSC node (put
the correct <nodename> inside the file).
Filename: <nodename>-OAM.xml
Template.xml
b. Drag and drop the <nodename>-OAM.xml file onto the ENM CLI, then
perform the following command:
3. Configure LDAP and set its Administrative State to UNLOCKED (ENM CLI):
Template.xml
<Node>
<nodeFdn>NetworkElement=<nodename></nodeFdn>
<tlsMode>LDAPS</tlsMode>
<userLabel>ENM</userLabel>
<useTls>true</useTls>
</Node>
</Nodes>
c. Drag and drop the <nodename>-LDAPS.xml file onto the ENM CLI,
then perform the following command:
a. Create (if not existing) a User Role named CpRole0 with Role Type
COM Role.
— SystemAdministrator
— SystemSecurityAdministrator
— EricssonSupport
— BscApplicationAdministrator
— SystemReadOnly
— CpRole0
For all the roles, the Target Group must be set to ALL.
The ENM user must have the Force Password Change disabled.
c. Update node credentials with ldapApplication user enabled and
with ENM User credentials as Secure user credentials:
d. Verify that node credentials have been updated under ENM with
Secure user equal to ENM User with the command:
#help/app/cliapp/topic/syntax_secadm/credentials_create
#help/app/cliapp/topic/syntax_secadm/credentials_update
LDAP must be configured on the node before testing the features in ENM. User
management must be supported on the node.
This procedure must be verified on the node when integrated with ENM.
Use the following procedure to verify LDAP functionality from ENM side.
Roles: Admin, Amos Admin, All COM roles (COM target all).
3. Set username and password for the new user using the following command:
4. Log on ENM as the user to test the EIR-FE/vEIR_FE features, when LDAP is
configured on node.
The proxy account password length must have 24 characters (default value) for
Machine to Machine (M2M) password complexity requirement.
Execute this procedure to have temporarily a proxy account for the node with the
supported password length.
For such nodes, a new proxy account is created and configured and the old proxy
account, if any, can be deleted.
Prerequisites
— No auto provisioning procedure is ongoing.
— User has the list of the nodes which need to have a new proxy account.
Steps
It returns <file-name>.xml file as output that contains all the proxy accounts
currently present.
Example
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<proxyAccountsData>
<proxyAccountsCounters>
<numOfProxyAccounts>4</numOfProxyAccounts>
<numOfRequestedProxyAccounts>4</numOfRequestedProxyAccounts>
<numOfLegacyProxyAccounts>4</numOfLegacyProxyAccounts>
<numOfRequestedLegacyProxyAccounts>4</numOfRequestedLegacyProxyAccou →
nts>
</proxyAccountsCounters>
<proxyAccounts>
<proxyAccount>
<dn>cn=ProxyAccount_1,ou=proxyagent,ou=com,dc=apache,dc=com</dn>
<adminStatus>ENABLED</adminStatus>
<createDate>2022-12-15 08:50:57</createDate>
<lastLoginDate>2023-01-09 08:50:00</lastLoginDate>
</proxyAccount>
<proxyAccount>
<dn>cn=ProxyAccount_2,ou=proxyagent,ou=com,dc=apache,dc=com</dn>
<adminStatus>ENABLED</adminStatus>
<createDate>2022-12-16 09:51:00</createDate>
<lastLoginDate>2022-12-17 10:51:00</lastLoginDate>
</proxyAccount>
<proxyAccount>
<dn>cn=ProxyAccount_3,ou=proxyagent,ou=com,dc=apache,dc=com</dn>
<adminStatus>ENABLED</adminStatus>
<createDate>2022-12-16 09:52:57</createDate>
<lastLoginDate>NEVER</lastLoginDate>
</proxyAccount>
<proxyAccount>
<dn>cn=ProxyAccount_4,ou=proxyagent,ou=com,dc=apache,dc=com</dn>
<adminStatus>ENABLED</adminStatus>
<createDate>2022-12-16 12:01:22</createDate>
<lastLoginDate>2023-01-09 09:30:01</lastLoginDate>
</proxyAccount>
</proxyAccounts>
</proxyAccountsData>
2. List the proxy accounts used by Auto Provisioning and remove them from the
<file-name>.xml file.
Example
FDN : AutoProvisioningAccounts=1,AutoProvisioningAccount=Router6672
userName : cn=ProxyAccount_2,ou=proxyagent,ou=com,dc=apache,dc=com
FDN : AutoProvisioningAccounts=1,AutoProvisioningAccount=RadioNode
userName : cn=ProxyAccount_1,ou=proxyagent,ou=com,dc=apache,dc=com
2 instance(s)
cn=ProxyAccount_2,ou=proxyagent,ou=com,dc=apache,dc=com
cn=ProxyAccount_1,ou=proxyagent,ou=com,dc=apache,dc=com
3. Create a proxy account for each node and configure it on the node.
If the node is in CM Sync, see the procedure described in section LDAP
Configuration on Baseband Radio Node and 5GRadioNode on page 277.
If the node is not in CM Sync, see the procedure described in section LDAP
Manual Configuration on page 280.
Verify that the command is performed successfully for all nodes as described
in the previous procedures.
The DISABLED status can be reverted, so, before deleting a proxy account,
you can verify that it is not currently used by any node, avoiding the risk to
permanently lose synchronization.
For each of the proxy account defined in the XML, the administrative status
is set to DISABLED.
For more info about the XML file structure, see online help.
Note: This action cannot be reverted, the deleted proxy accounts cannot
be restored.
Table 18
Level Authentication Encryption Behavior
noauthnopriv username No Uses a username match for
authentication
authnopriv MD5 or SHA1 No Provides authentication based
on the MD5 or SHA1
algorithms.
authpriv MD5 or SHA1 DES or AES128 Provides authentication based
on the MD5 or SHA1
algorithms. In addition
to authentication, provides
DES or AES128 encryption
algorithms.
— authnopriv
— authpriv
Actors
Node-Security Administrator, Action: snmp, Resource: authnopriv or authpriv.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
— The nodes must have the SNMP version parameter set to SNMPv3 and the
correct security level.
Steps
secadm snmp
Results
SNMPv3 security parameter correctly set on NetworkElementSecurity MO, for
each node.
Example: For MSC nodes with OAM enrollment to primary ENM, run the
steps described in the section Add ENM CAs to MSC Node (MSC-BC-BSP,
MSC-BC-IS, MSC-DB, and MSC-DB-BSP) on page 94 for downloading
and installing the CA certificates of Secondary ENM on to node. Similar
steps must be executed for different node types and enrollment types.
Install trusted certificates on Security Gateway to establish IPsec setup. See the
section Trust Distribution for Security Gateway on page 333 for information.
If the managed element is added under SubNetwork, all commands must include
SubNetwork also in FDN.
For example,
If the configuration is of type IPv6 over IPv4 (IPv6 inner and IPv4
outer), use IPv6 MOs instead IPv4 MOs for the inner router network and
provide IPv6 addresses for Dst, NextHop, Security gateway addresses. The
following are the sample commands to create RouteTableIPv4Static and
RouteTableIPv6Static MOs.
IPv4:
IPv6:
License Activation
As part of IPsec activation, activate IPsec and VR licenses using the following
commands. This is for all the IPsec configurations.
To know the Current IP Security Configuration, see the section IPsec Current
Configuration on Baseband Node on page 322.
After changing the accessPoint reference to node inner address, set the
ComConnectivityInformation:
Results
IPsec VPN connection must be established after the configuration of inner
network.
This task describes the steps required to configure the outer network.
3. Create a Vlan port for the outer network, if the VlanPort MO exists.
Set address attribute to address of the default router, for example: 1.2.3.4.
Results
Outer network required for IPsec configuration must be configured successfully.
This task describes detailed steps to configure the outer network for OAM
required for IPsec configuration.
Results
Outer network must be configured for OAM successfully.
This task describes how to configure the outer network for UPCP for IPsec
configuration.
Results
Outer network must be configured for UPCP successfully.
Ethernet needs to have reference to physical TN port and match the TN port
configured in the site equipment file.
Results
Physical interfaces must be configured successfully.
This task describes detailed steps to configure IPsec VPN connection and
inner network for OAM.
Note: After completion of this step, user needs to make sure that
operationalState attribute in Ikev2Session MO must be ENABLED.
Only then, user must continue with the following steps.
After changing the accessPoint reference to node inner address, set the
ComConnectivityInformation by using the following command.
8. Sync the node and check the sync status by using following commands.
Results
IPsec VPN connection must be established after the configuration of OAM inner
network.
10.1.7 Configure IPsec VPN and Inner Network for OAM with Different VLAN
This task describes detailed steps to configure the IPsec VPN connection
and inner network for OAM when different VLANs are used for OAM and
UPCP.
After changing the accessPoint reference to node inner address, set the
ComConnectivityInformation by using the following command.
8. Sync the node and check the sync status by using the following commands.
Node must be in SYNCHRONIZED state.
Results
IPsec VPN connection for OAM must be established after configuration of inner
network with different VLAN for OAM.
This task describes how to configure IPsec VPN connection and inner
network for User Plane and Control Plane (UP and CP).
Set the address attribute to UP/CP traffic Security Gateway outer address.
For example, 5.6.7.8.
12. Set the references for upIpAddressRef and sctpRef attributes under
EnodeBFunction MO.
Results
IPsec VPN connection for UP and CP must be established after the configuration
of inner network for UP and CP.
10.1.9 Configure IPsec VPN and Inner Network for UP/CP with Different VLAN
This task describes how to configure the IPsec VPN connection and inner
network for UPCP with different VLAN.
Results
IPsec VPN connection for UPCP must be established after configuring the inner
network for UPCP with different VLAN.
Actors
Authorized for: Cmedit_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
IPsec must be activated on the node with either Configuration A, B, or C.
For example,
Steps
Once the node comes to SYNCHRONIZED state, all O&M communication flows
from outer network instead of IPsec VPN for O&M.
Once the node comes to SYNCHRONIZED state, all O&M communication flows
from IPsec VPN instead of outer network.
Results
The current activated IPsec configuration must be disabled.
Actors
Authorized for: Cmedit_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
3. Configure the outer network. See the section Configure Outer Network on
page 300.
4. Configure the IPsec VPN connection and inner network. See the section
Configure IPsec VPN and Inner Network on page 298 for details.
Results
IPsec is enabled on the node with configuration A.
Actors
Authorized for: Cmedit_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
3. Configure the outer network. See the section Configure Outer Network on
page 300 for details.
4. Configure the IPsec VPN connection and inner network for OAM. See the
section Configure IPsec VPN and Inner Network for OAM on page 304 for
details.
5. Configure the Internet Protocol Security VPN connection and inner network
for UPCP. See the section Configure IPsec VPN and Inner Network for UP/CP
on page 307 for details.
Results
IPsec is enabled on the node with configuration B.
Actors
Authorized for: Cmedit_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
4. Configure the IPsec VPN connection and inner network for OAM.
See the section Configure IPsec VPN and Inner Network for OAM with
Different VLAN on page 306.
6. Configure the IPsec VPN connection and inner network for UPCP.
See the procedure Configure IPsec VPN and Inner Network for UP/CP with
Different VLAN on page 309.
Results
IPsec must be enabled on the node with configuration C.
Actors
Authorized for: Cmedit_Administrator, PKI_Operator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
If the managed element is added under SubNetwork, all commands must include
SubNetwork also in FDN.
Steps
Example
Entity Name - <node_name>-ipsec, <node_name>-oam
3. Verify whether the End Entity has been created by listing all End Entities in
the ENM PKI system.
b. Copy the subjectDN and use the same value as input for
enrollmentAuthorityName.
Example
enrollmentAuthorityName =
OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=NE_IPsec_CA
The command returns the IP address. In the following URL, update the
hostAddress with the retrieved IP address and also update the uri value
with the updated URL:
http://<hostAddress>:8091/pkira-cmp/synch
8. Check whether the Root CA of the ENM is external CA or internal CA, before
trusted certificates installation.
If the Subject Dn and issuer Dn are same, then Root CA is a self signed
certificate. If they do not match, Root CA is an external CA.
If the node has IPv4 address, copy the IPv4 URLs or if the node has IPv6
address, copy the IPv6 URLs from the output for both NE_External_CA and
ENM_PKI_Root_CA.
Update with the previous two URLs and run the two commands:
10. Execute the commands to fetch the external Root CA chain, if the Root CA is
an external CA.
Get the issuer dn of the above certificate and list the external CAs in the
system. If the issuer dn exists in the external CAs, install that certificate
also on Node as trust. Repeat this step until the Root Certificate (where
subject Dn and issuer Dn are same) is installed.
pkiadm extcalist
Example
subjectName = CN=<node_name>-ipsec,O=ERICSSON,C=SE,OU=BUCI
DUAC NAM, subjectAltName = IP:<IPV4/IPV6_address> (or)
DNS:<dns_address>
Results
Node is enrolled and trusted certificates are installed on the node successfully.
Example 1
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceS →
chemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2IPSec_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>NODE-IPSEC</Name>
</Category>
<EntityInfo>
<Name>NetworkElementID-ipsec</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>NetworkElementID-ipsec</Value>
</SubjectField>
</Subject>
<OTP>Ericsson05</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
<KeyGenerationAlgorithm>
<Name>ECDSA</Name>
<KeySize>256</KeySize>
</KeyGenerationAlgorithm>
3. ENM PKI supports generation of End Entity certificates with
ECDSA key, but CA certificates are generated with RSA keys only.
Signatures on all the certificates including End Entity and CA
certificates in the chain are done by RSA algorithm even if the
node IPsec or OAM certificate is enrolled with ECDSA key. For more
details, see the section Network Security Configuration Limitations
on page 454.
The NetworkElementID is the identifier that the user must use at the end of
this procedure when the Baseband Radio Node. If the Certificate needs to be
generated with ECDSA keys on Radio nodes with versions is added in ENM.
2. In the <EntityInfo><SubjectField> tag, the <Value> must be
NetworkElementID-ipsec.
The NetworkElementID is the identifier that the user must use at the end of
this procedure when the Baseband Radio Node is added in ENM.
3. Save the XML file that has been created.
Actors
Authorized for: Cmedit_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
The user must identify the current configuration of IPsec on Baseband Nodes.
If the managed element is added under SubNetwork, then all commands must
include SubNetwork also in FDN.
Example 2
cmedit get SubNetwork=<subnetwork_name>,ManagedElement=<node_name>,SystemFunctio →
ns=1,SysM=1,OamAccessPoint=1
Prerequisites
IPsec configuration A must be activated on Baseband node.
Steps
The command returns the number of routers present under Transport MO.
If there are two routers, one is for inner network and the other is for outer
network.
If the command returns two inner routers and one outer router, then run the
following commands and identify the inner router address mapping.
If the command returns two inner and two outer routers, then run the
following commands and identify the inner and outer routers address
mapping.
Configuration B has one inner network OAM, one inner network user or control
plane, and one outer network.
Prerequisites
IPsec configuration B must be activated on Baseband node.
Steps
The command returns the number of routers present under Transport MO. If
there are three routers, two are meant for inner networks and other one is for
outer network.
The command returns the number of routers present under Transport MO. If
there are three routers, two are meant for inner networks and the other one
is for outer network.
Results
If the localAddress reference under both IpsecTunnel MOs points to same node
outer address which is present in cmedit get
ManagedElement=<node_name>,Transport=1,Router=innerUpCp,IpsecTunnel=1
AddressIPV4 under outer network, then the node is activated with configuration
B.
Prerequisites
IPsec configuration C must be activated on Baseband node.
Steps
The command returns the number of routers present under Transport MO. If
there are four routers, two are meant for inner networks and other one is for
outer networks.
2. Check the references of these MOs to identify whether inner networks are
meant for OAM and user or control plane.
Actors
Authorized for: PKI_EE_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Drag and drop the CSR file onto ENM CLI and run the command to generate
the certificate.
Example
pkiadm ctm EECert -gen -en ERBS_1 -csr file:CSR.csr -f PEM
This command generates the certificate with the chain (the issuer certificate
until the root CA). If the chain is not needed, --nochain or -nch option can
be used.
Example
pkiadm ctm EECert -l -en ERBS_1 -s active
Results
Certificate is successfully generated on ENM deployment with provided CSR.
10.1.16.1 Offline Enrollment on Security Gateway with CSR Entity XML Template
Example 3
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceS →
chemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="SecGw_SAN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>SEC-GW</Name>
</Category>
<EntityInfo>
<Name>%SecurityGatewayName%</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>%organization%</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>%organizationUnit%</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>%countryCode%</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>%SecurityGatewayName%</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString">
<StringValue>%IpAddressOfGateway%</StringValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
<OTP>Ericsson05</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
Example: srx240b-7
2. Replace %IpAddressOfGateway% with the IP address of Security Gateway in
the XML and save it.
Example: 10.213.22.48
3. Replace %organization% with the organization name in XML and save it.
Example: ERICSSON
4. Replace %organizationUnit% with name of the organization unit in XML
and save it.
Example: IN
PKI generates the CSR and its certificate, on behalf of Security Gateway.
Actors
Authorized for: PKI_EE_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
Example
pkiadm certmgmt EECert --generate -nocsr --entityname ERBS_1
--format JKS --password secure
This command generates the certificate with chain (the issuer certificate
until the root CA). If the chain is not needed, --nochain or -nch option can
be used.
Example
pkiadm ctm EECert -l -en ERBS_1 -s active
Results
Certificate must be successfully generated on ENM deployment.
10.1.17.1 Offline Enrollment on Security Gateway without CSR Entity XML Template
Example 4
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceS →
chemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="SecGw_SAN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>SEC-GW</Name>
</Category>
<EntityInfo>
<Name>%SecurityGatewayName%</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>%SecurityGatewayName%</Value>
</SubjectField>
</Subject>
<SubjectAltName>
<SubjectAltNameField>
<Type>IP_ADDRESS</Type>
<Value xsi:type="SubjectAltNameString">
<StringValue>%IpAddressOfGateway%</StringValue>
</Value>
</SubjectAltNameField>
</SubjectAltName>
<OTP>Ericsson05</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
Example: srx240b-7
Example: 10.213.22.48
This procedure describes the trust distribution for the Security Gateway.
Actors
Authorized for: PKI_EE_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
pkiadm extcalist
Get the CA name that matches with issuer DN of the active certificate of
ENM_PKI_Root_CA. This command must be traversed until the root of the
chain is found and all those CA certificates must be installed as trust.
Results
Successful download of trusted certificates from ENM deployment to install them
on Security Gateway.
Note: This feature is supported only for Baseband Radio Nodes having version
>= 18.Q3.
This use case configures the node to contact the External CA during the auto
provisioning for IPsec node credentials.
See the section Reissue a Node Certificate of the document ENM Network
Security Configuration System Administrator Guide, Reference [4].
See the section Migration of Baseband Radio Node from ENM PKI CA to
External CA on page 340.
Actors
Authorized for: NodeSecurity_Administrator, action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Table 19
Tag Name Value Example
CertificateSubjectDn SubjectDN with which CN=TestNode,OU=TestO
the certificate has to be U,O=TestOrg,C=SE
issued to the node.
ChallengePhrase The challenge password
to be used for generating
Certificate by External
CA.
InterfaceFdn This is needed if the ManagedElement=<Node
external CA cannot be Name>,Transport=1,Ro
reached through the uter=<RouterName>,In
OAM interface. terfaceIPv4=1,Addres
sIPv4=1
FDN of Address (either
IPv4 or IPv6) MO under
the Interface MO which
belongs to the outer
network of IPsec tunnel.
CertificateAuthority SubjectDN of the node CN=TestNode,OU=TestO
Dn certificate issuer. U,O=TestOrg,C=SE
CaCertificate PEM content of External
RootCA certificate which
can be obtained with the
following steps.
Steps
Results
The node is successfully enrolled with IPsec certificate and trusted certificates
provided by External CA.
Actors
Authorized for: NodeSecurity_Administrator, action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Table 20
Tag Name Value Example
InterfaceFdn This tag is mandatory if ManagedElement=<Node
the External CA cannot Name>,Transport=1,Ro
be reached through the uter=<RouterName>,In
OAM interface. terfaceIPv4=1,Addres
sIPv4=1
FDN of Address (either
IPv4 or IPv6) MO under
the Interface MO which
belongs to the outer
network of IPsec tunnel.
TDPSUrl TDPS URL of the
external CA certificates
which is distributed as
trusts on the node.
TrustedCACertIssuerD SubjectDN of trusted CN=TestNode,OU=TestO
n certificate issuer. U,O=TestOrg,C=SE
CertificateSerialNum Serial number of trusted
ber certificate.
Steps
2. Run the command with the Trust Distribution XML file as input.
Prerequisites
Node is added and synchronized with ENM.
Steps
2. Perform enrollment of IPsec certificate on the node with the External CA.
See the section Enrollment of IPsec Certificate Issued by External CA on
page 335.
a. There can be one or more IPsecTunnels for each Router, so, from the
Router MO traverse to one of the IPsecTunnel MO and Ikev2Session
MO under it.
For example,
ManagedElement=<nodeName>,Transport=1,Router=<RouterName>,
IPsecTunnel=1,Ikev2Session=1
c. Run the command show ikesa which can display IPsec tunnel status
between Node and Security Gateway. The IPsec tunnel is established
with the certificates of External CA.
d. Repeat the steps from step a to step c for each IPsecTunnel (if any).
Results
The node is successfully enrolled with IPsec certificate and trusted certificates
provided by External CA.
The IPsec tunnel of the node with Security Gateway is not broken after successful
enrollment.
This certificate revocation check can be switched on or off for the nodes.
After the CRL Check is enabled on the node, the node checks if the peer
certificate is revoked during IPSec/OAM communication.
If the peer certificate is revoked, the node does not establish any communication
channel with the mentioned services.
The status of whether the CRL Check is enabled or disabled on the node can be
checked by the Read command.
For information on the supported node types and versions for CRL Check for
OAM and IPsec, see Supported Node Types on page 344.
For information on the supported values for the certificate types on the nodes for
the corresponding CRL Check commands, see Supported Certificate Type on page
345.
For information on the cert type behavior and CRL check, see Cert Type Behavior
on CRL Check on page 345
Prerequisites
These are the Node-specific prerequisites.
COM/ECIM Node
— To enable, disable, and read CRL Check for OAM on Baseband Radio Node
and 5GRadioNode, node must have OAM certificate and node release version
must be 16B and above.
— To enable, disable, and read CRL Check for IPsec on Baseband Radio
Node and 5GRadioNode, node must have IPsec certificate and node release
version must be 17A and above.
CPP Node
— To enable, disable, and read CRL Check for OAM on MGW nodes, node
release version must be 17B and above.
— To enable, disable, and read CRL Check for OAM & IPsec on ERBS nodes,
node release version must be 17B and above.
ER6000 Node
— To enable, disable, and read CRL Check for OAM on ER6000 nodes, node
release version must be 17B and above.
Steps
If the CDPS extension is enable, go for step 2 and skip the step 3; otherwise
go to step 3.
2. Check for the CDPS extension for the following CAs by downloading the
corresponding CA certificate:
— ENM_Infrastructure_CA
— ENM_OAM_CA
Role: user with PKI Operator role can download the certificate on entities.
The user with Cmedit_Administrator role can run the following commands:
Table 21
Node Name Network NE Type Platform Type NE Release NE Release
Supported for Supported for
OAM IPsec
RadioNode WCDMA RadioNode ECIM 16B onwards 17A onwards
BaseBand 5212
RadioNode LTE RadioNode ECIM 16B onwards 17A onwards
BaseBand 5216
RadioTNode Transport RadioTNode ECIM 16B onwards 17A onwards
(T605)
RadioTNode Transport RadioTNode ECIM 16B onwards 17A onwards
(C608)
eNodeB DU LTE ERBS CPP L17B onwards L17B onwards
Radio Node
(Micro &
Macro RBS)
Router6672 Transport Router6672 ER6000 17B onwards 17B onwards
Router6274 Transport Router6274 ER6000 18Q2GA 18Q2GA
onwards onwards
Router6675 Transport Router6675 ER6000 18A onwards 18A onwards
Router6x71 Transport Router6x71 ER6000 18A onwards 18A onwards
Router6273 Transport Router6273 ER6000 20.Q1 onwards 20.Q1 onwards
Router6273 Transport Router6273 ER6000 21.Q2 onwards N/A
vPP (ECIM) LTE vPP ECIM 17Q3 onwards 17Q3 onwards
VTFRadioNode LTE VTFRadioNode ECIM 18Q1 onwards 18Q1 onwards
5GRadioNode NR RAN 5GRadioNode ECIM 18Q4 onwards 18Q4 onwards
gNodeB NR RAN Radionode ECIM 19Q2 onwards 19Q2 onwards
Baseband
RadioNode
Table 22
Node Name Platform Type Cert Types to Enable or Cert Types to Read CRL
Disable CRL Check Check
RadioNode BaseBand ECIM IPSEC, OAM, ALL IPSEC, OAM
5212
RadioNode BaseBand ECIM IPSEC, OAM, ALL IPSEC, OAM
5216
RadioTNode T605 ECIM IPSEC, OAM, ALL IPSEC, OAM
RadioTNode C608 ECIM IPSEC, OAM, ALL IPSEC, OAM
eNodeB DU Radio Node CPP ALL IPSEC, OAM
(Micro & Macro RBS)
Router6672 ER6000 IPSEC, OAM, ALL IPSEC, OAM
Router6274 ER6000 IPSEC, OAM, ALL IPSEC, OAM
Router6675 ER6000 IPSEC, OAM, ALL IPSEC, OAM
Router6x71 ER6000 IPSEC, OAM, ALL IPSEC, OAM
Router6273 ER6000 IPSEC, OAM, ALL IPSEC, OAM
Router6673 ER6000 OAM OAM
vPP (ECIM) ECIM IPSEC, OAM, ALL IPSEC, OAM
5GRadioNode ECIM IPSEC, OAM, ALL IPSEC, OAM
Fronthaul 6020 ECIM OAM OAM
Controller6610 ECIM OAM OAM
Table 23
Cert Type Behavior
IPSEC It refers to enable, disable, or read CRL Check on
node regarding Security Gateway Communication.
OAM It refers to enable, disable, or read CRL Check on
node regarding ENM Services Communication.
ALL It refers to enable or disable CRL Check on node
regarding both Security Gateway & ENM Services
Communication.
This task gives overview to manage CDPS extension in all End Entities and
CA Certificates.
To manage CRL Check on node, CDPS extension must be present in all End
Entities and CA Certificates.
For ENM service, CredM CLI runs every 30 minutes to check the status of
the ENM service certificate and reissues new certificate, if it is revoked. Hence
operator must wait for 30 minutes, so that the new certificate is installed on the
ENM service.
For SecGW, the operator must reissue the certificate and install it manually on
the SecGW.
Prerequisites
No prerequisites.
Steps
1. Enable certificatesRevListDistributionPointServiceIpv4Enable
and certificatesRevListDistributionPointServiceIpv6Enable
parameters.
See View and Modify Configuration Parameters on page 12.
Results
CDPS extension is present in all End Entities and CA Certificates.
This task describes the procedure to reissue all End Entity and CA certificates.
Prerequisites
— User with PKI Administrator role can trigger all operations of certificate
command.
Steps
Note: Do not use the options such as rekey or renew with revocation,
while reissuing CAs.
Example
7. Retrieve the Trust certificate state of all the nodes existing in the system.
Note the serial number and issuer of the trusted certificates for each node, as
they are used in Step 13.
Example
8. Distribute trusts to all nodes and wait until the job for trust distribution to
nodes is completed successfully.
Note: See online help to distribute trust to nodes with various available
options.
See the section Reissue Service Certificates in the document ENM Public Key
Infrastructure System Administrator Guide, Reference [8].
11. Reissue all node certificates and wait until the job to issue certificates for
nodes is completed successfully.
Note: See online help to reissue node certificates with various available
options.
— ENM_NBI_CA
— ENM_UI_CA
— ENM_Management_CA
— ENM_OAM_CA
— NE_OAM_CA
— NE_IPsec_CA
— NE_External_CA
— ENM_External_Entity_CA
— ENM_E-mail_CA
— ENM_Infrastructure_CA
Example
13. Remove old trust certificates from all the nodes after the new trust has been
distributed and node certificates have been reissued.
Use the issuer name and ca serial number of trust certificates obtained in
Step 7.
secadm trust remove -ct <IPSec|OAM> --issuer-dn "<issuer_name>" -sn <ca seri →
alnumber> -nf file:<file name>
Note: See online help to remove trust from nodes with various available
options.
Results
All End Entity and CA certificates are reissued.
Actors
NodeSecurity_Administrator is allowed to perform CRL Check Enable operation.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
or
or
or
or
or
or
Results
Successfully started a job for CRL Check enable operation. Perform secadm job
get -j <JOB_ID> to get progress info.
Actors
NodeSecurity_Administrator is allowed to perform CRL Check Disable operation.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
or
or
or
or
or
or
Results
Successfully started a job for CRL Check disable operation. Perform secadm job
get -j <JOB_ID> to get progress info.
Actors
NodeSecurity_Administrator and NodeSecurity_Operator are allowed to perform
CRL Check Read operation.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
For OAM:
or
For IPsec:
or
or
For IPsec:
or
Results
The expected result for OAM is:
Usually, the latest CRL is being updated only when the existing CRL on the node
is expired. However, the operator can use this feature to update the latest CRL on
the node before the expiration of the existing CRL.
Actors
NodeSecurity_Administrator is allowed to perform On-Demand CRL Download
operation.
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
— CDPS extension must be present in all the certificates of CA and End Entity.
— Based on the network type, peer certificate must contain the respective
CDPS URL. For example, if the node is in IPv4 network, its peer certificate
must contain IPv4 CDPS URL. Similarly, if node is in IPv6 network, its peer
certificate must contain IPv6 CDPS URL.
Steps
Or
2. Download CRL on multiple nodes by providing nodes name using a text file.
Run the following ENM CLI command on:
Or
Results
Successfully started a job to download CRL on demand. Perform secadm job
get -j <JOB_ID> to get progress info.
This task verifies if the CRL has been downloaded on the COM/ECIM node.
Steps
Steps
Example
1. Run the cmedit command to view the existing value of the CRL early update
time interval:
This procedure describes steps to get the values to form the vSecurity file
manually.
Actors
Authorized for: PKI_Administrator
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
— Entity must be created in the system. To create an entity, see Create Entity
for VNFM on page 362.
— After the XML creation, do not lose the OTP value given in the XML, as it is
not possible to retrieve it once the entity is created.
Steps
2. Fetch cmpv2CaName.
b. Copy the subjectDN and use the same value as input for
cmpv2CaName.
Example
enrollmentAuthorityName = OU=BUCI_DUAC_NAM,C=SE,O=ERICSSON,CN=NE_OA →
M_CA
3. Calculate cmpv2MsgSignerFingerprint.
From the XML, obtain all the values that are in <SubjectField> tag used to
create the entity.
Example
SubjectName is OU=BUCI DUAC NAM,C=SE,O=ERICSSON,CN=VNFM-01
SubjectField Acronym
OrganisationUnit OU
Country C
Common Name CN
Organisation O
Results
The following field values are obtained:
Actors
Authorized for: PKI_EE_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
1. Create an entity with Create Entity for VNFM XML Template on page 363.
Results
Entity must be created successfully.
Example 5
<Entities xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:noNamespaceS →
chemaLocation="EntitiesSchema.xsd">
<Entity>
<PublishCertificatetoTDPS>true</PublishCertificatetoTDPS>
<EntityProfile Name="DUSGen2OAM_CHAIN_EP"/>
<KeyGenerationAlgorithm>
<Name>RSA</Name>
<KeySize>2048</KeySize>
</KeyGenerationAlgorithm>
<Category>
<Modifiable>true</Modifiable>
<Name>Node-OAM</Name>
</Category>
<EntityInfo>
<Name>%VNFMName%</Name>
<Subject>
<SubjectField>
<Type>ORGANIZATION</Type>
<Value>ERICSSON</Value>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
<Value>BUCI DUAC NAM</Value>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
<Value>SE</Value>
</SubjectField>
<SubjectField>
<Type>COMMON_NAME</Type>
<Value>%VNFMName%</Value>
</SubjectField>
</Subject>
<OTP>TestPassw0rd</OTP>
<OTPCount>5</OTPCount>
</EntityInfo>
<OTPValidityPeriod>300</OTPValidityPeriod>
</Entity>
</Entities>
— replace %VNFMName% with the name of the VNFM at all parts in the XML and
save it. For example, VNFM-01.
Actors
Authorized for: PKI_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
cmpv2MsgSignerFingerprint or CA Fingerprint must be obtained.
Prerequisites
No prerequisites.
Steps
2. Update the hostAddress with the retrieved IP address and update the URI
value with the updated URL to cmpv2Servers attribute, in the following
URL.
http://<hostAddress>:8091/pkira-cmp/synch
Results
cmpv2 Server URL must be obtained.
Cipher Management for nodes provides capability to set ciphers, from the
ones supported on the node.
It also supports the listing of the enabled and the supported ciphers of the node.
The Get ciphers procedure facilitates user to get the supported and enabled
ciphers on the node. The enabled ciphers can either be subset or equal to all
listed supported ciphers.
Note: The Set ciphers procedure can disrupt the server-client connectivity if
used improperly. The connection setup can fail if a common cipher
cannot be found between an external client and the node. Furthermore,
if user accidentally resets the cipher suites configuration to a default
configuration, it can weaken the network security. It is therefore
important to perform the cipher suites configuration in a controlled and
careful way.
Before executing the Set ciphers procedure, user must get the supported ciphers
on the given nodes. So, only those ciphers can be added, removed, and ranked
in enabled ciphers list. It is the responsibility of user to know which ciphers to be
added, removed, and have enough knowledge on how to rank the ciphers. To get
the ciphers on the node, see Get Ciphers on Nodes on page 384.
Based on the above capabilities and knowing the list of ciphers supported by
ENM (mentioned in the table), the user can drive the selection of ciphers during
handshake with the following steps:
— List the ciphers supported by a node (or list of nodes of the same type) for a
specific protocol.
— Enable the strong ciphers on the nodes by placing the strong ciphers at top
rank of the list. These ciphers must be supported by ENM. See the table for
the list of ENM Supported Ciphers.
— Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Hypertext
Transfer Protocol Secure (HTTPS)
The table lists the ciphers supported by ENM for each protocol type.
Table 25
Platform Type ENM Supported TLS Protocol ENM Supported Ciphers in ENM Supported Ciphers in
TLSv1.2 TLSv1
ECIM LDAP TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_ECDSA_WITH_A
ER6000 256_CBC_SHA384 ES_128_CBC_SHA
Router8800 TLS_RSA_WITH_AES_256_CB TLS_ECDHE_RSA_WITH_AES_
C_SHA256 128_CBC_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_RSA_WITH_AES_128_CB
6_CBC_SHA256 C_SHA
TLS_ECDHE_ECDSA_WITH_A TLS_ECDH_ECDSA_WITH_AE
ES_128_CBC_SHA256 S_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDH_RSA_WITH_AES_1
128_CBC_SHA256 28_CBC_SHA
TLS_RSA_WITH_AES_128_CB TLS_DHE_RSA_WITH_AES_12
C_SHA256 8_CBC_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_DHE_DSS_WITH_AES_12
S_128_CBC_SHA256 8_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1 TLS_ECDHE_ECDSA_WITH_3
28_CBC_SHA256 DES_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_12 TLS_ECDHE_RSA_WITH_3DE
8_CBC_SHA256 S_EDE_CBC_SHA
TLS_DHE_DSS_WITH_AES_12 TLS_ECDH_ECDSA_WITH_3D
8_CBC_SHA256 ES_EDE_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A TLS_ECDH_RSA_WITH_3DES_
ES_128_CBC_SHA EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA
TLS_RSA_WITH_AES_128_CB
C_SHA
TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1
28_CBC_SHA
TLS_DHE_RSA_WITH_AES_12
8_CBC_SHA
TLS_DHE_DSS_WITH_AES_12
8_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_
256_GCM_SHA384
TLS_RSA_WITH_AES_256_GC
M_SHA384
TLS_DHE_RSA_WITH_AES_25
6_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_
128_GCM_SHA256
TLS_RSA_WITH_AES_128_GC
M_SHA256
TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_3
DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_3DE
S_EDE_CBC_SHA
TLS_ECDH_ECDSA_WITH_3D
ES_EDE_CBC_SHA
TLS_ECDH_RSA_WITH_3DES_
EDE_CBC_SHA
ECIM FTPES TLS_ECDHE_ECDSA_WITH_A TLS_ECDHE_ECDSA_WITH_A
ES_256_CBC_SHA384 ES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA384 256_CBC_SHA
TLS_RSA_WITH_AES_256_CB TLS_RSA_WITH_AES_256_CB
C_SHA256 C_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_AE
S_256_CBC_SHA384 S_256_CBC_SHA
Platform Type ENM Supported TLS Protocol ENM Supported Ciphers in ENM Supported Ciphers in
TLSv1.2 TLSv1
TLS_ECDH_RSA_WITH_AES_2 TLS_ECDH_RSA_WITH_AES_2
56_CBC_SHA384 56_CBC_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_DHE_RSA_WITH_AES_25
6_CBC_SHA256 6_CBC_SHA
TLS_DHE_DSS_WITH_AES_25 TLS_DHE_DSS_WITH_AES_25
6_CBC_SHA256 6_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A TLS_ECDHE_ECDSA_WITH_A
ES_256_CBC_SHA ES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA 128_CBC_SHA
TLS_RSA_WITH_AES_256_CB TLS_RSA_WITH_AES_128_CB
C_SHA C_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_AE
S_256_CBC_SHA S_128_CBC_SHA
TLS_ECDH_RSA_WITH_AES_2 TLS_ECDH_RSA_WITH_AES_1
56_CBC_SHA 28_CBC_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_DHE_RSA_WITH_AES_12
6_CBC_SHA 8_CBC_SHA
TLS_DHE_DSS_WITH_AES_25 TLS_DHE_DSS_WITH_AES_12
6_CBC_SHA 8_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A TLS_ECDHE_ECDSA_WITH_3
ES_128_CBC_SHA256 DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_3DE
128_CBC_SHA256 S_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CB TLS_RSA_WITH_3DES_EDE_C
C_SHA256 BC_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_3D
S_128_CBC_SHA256 ES_EDE_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1 TLS_ECDH_RSA_WITH_3DES_
28_CBC_SHA256 EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_12 TLS_DHE_RSA_WITH_3DES_E
8_CBC_SHA256 DE_CBC_SHA
TLS_DHE_DSS_WITH_AES_12 TLS_DHE_DSS_WITH_3DES_E
8_CBC_SHA256 DE_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A
ES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA
TLS_RSA_WITH_AES_128_CB
C_SHA
TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1
28_CBC_SHA
TLS_DHE_RSA_WITH_AES_12
8_CBC_SHA
TLS_DHE_DSS_WITH_AES_12
8_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A
ES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_A
ES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_
256_GCM_SHA384
TLS_RSA_WITH_AES_256_GC
M_SHA384
TLS_ECDH_ECDSA_WITH_AE
S_256_GCM_SHA384
TLS_ECDH_RSA_WITH_AES_2
56_GCM_SHA384
TLS_DHE_RSA_WITH_AES_25
6_GCM_SHA384
TLS_DHE_DSS_WITH_AES_25
6_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_
128_GCM_SHA256
TLS_RSA_WITH_AES_128_GC
M_SHA256
TLS_ECDH_ECDSA_WITH_AE
S_128_GCM_SHA256
TLS_ECDH_RSA_WITH_AES_1
28_GCM_SHA256
Platform Type ENM Supported TLS Protocol ENM Supported Ciphers in ENM Supported Ciphers in
TLSv1.2 TLSv1
TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256
TLS_DHE_DSS_WITH_AES_12
8_GCM_SHA256
CPP SSL/TLS/HTTPS TLS_ECDHE_ECDSA_WITH_A TLS_ECDHE_ECDSA_WITH_A
ECIM ES_256_CBC_SHA384 ES_256_CBC_SHA
ER6000 TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_AES_
Router8800 256_CBC_SHA384 256_CBC_SHA
TLS_RSA_WITH_AES_256_CB TLS_RSA_WITH_AES_256_CB
C_SHA256 C_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_AE
S_256_CBC_SHA384 S_256_CBC_SHA
TLS_ECDH_RSA_WITH_AES_2 TLS_ECDH_RSA_WITH_AES_2
56_CBC_SHA384 56_CBC_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_DHE_RSA_WITH_AES_25
6_CBC_SHA256 6_CBC_SHA
TLS_DHE_DSS_WITH_AES_25 TLS_DHE_DSS_WITH_AES_25
6_CBC_SHA256 6_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A TLS_ECDHE_ECDSA_WITH_A
ES_256_CBC_SHA ES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA 128_CBC_SHA
TLS_RSA_WITH_AES_256_CB TLS_RSA_WITH_AES_128_CB
C_SHA C_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_AE
S_256_CBC_SHA S_128_CBC_SHA
TLS_ECDH_RSA_WITH_AES_2 TLS_ECDH_RSA_WITH_AES_1
56_CBC_SHA 28_CBC_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_DHE_RSA_WITH_AES_12
6_CBC_SHA 8_CBC_SHA
TLS_DHE_DSS_WITH_AES_25 TLS_DHE_DSS_WITH_AES_12
6_CBC_SHA 8_CBC_SHA
TLS_ECDHE_E47CDSA_WITH_ TLS_ECDHE_ECDSA_WITH_3
AES_128_CBC_SHA256 DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_3DE
128_CBC_SHA256 S_EDE_CBC_SHA
TLS_RSA_WITH_AES_128_CB TLS_RSA_WITH_3DES_EDE_C
C_SHA256 BC_SHA
TLS_ECDH_ECDSA_WITH_AE TLS_ECDH_ECDSA_WITH_3D
S_128_CBC_SHA256 ES_EDE_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1 TLS_ECDH_RSA_WITH_3DES_
28_CBC_SHA256 EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_12 TLS_DHE_RSA_WITH_3DES_E
8_CBC_SHA256 DE_CBC_SHA
TLS_DHE_DSS_WITH_AES_12 TLS_DHE_DSS_WITH_3DES_E
8_CBC_SHA256 DE_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A
ES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA
TLS_RSA_WITH_AES_128_CB
C_SHA
TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA
TLS_ECDH_RSA_WITH_AES_1
28_CBC_SHA
TLS_DHE_RSA_WITH_AES_12
8_CBC_SHA
TLS_DHE_DSS_WITH_AES_12
8_CBC_SHA
TLS_ECDHE_ECDSA_WITH_A
ES_256_GCM_SHA384
TLS_ECDHE_ECDSA_WITH_A
ES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_
256_GCM_SHA384
TLS_RSA_WITH_AES_256_GC
M_SHA384
TLS_ECDH_ECDSA_WITH_AE
S_256_GCM_SHA384
Platform Type ENM Supported TLS Protocol ENM Supported Ciphers in ENM Supported Ciphers in
TLSv1.2 TLSv1
TLS_ECDH_RSA_WITH_AES_2
56_GCM_SHA384
TLS_DHE_RSA_WITH_AES_25
6_GCM_SHA384
TLS_DHE_DSS_WITH_AES_25
6_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_
128_GCM_SHA256
TLS_RSA_WITH_AES_128_GC
M_SHA256
TLS_ECDH_ECDSA_WITH_AE
S_128_GCM_SHA256
TLS_ECDH_RSA_WITH_AES_1
28_GCM_SHA256
TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256
TLS_DHE_DSS_WITH_AES_12
8_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_3
DES_EDE_CBC_SHA
TLS_ECDHE_RSA_WITH_3DE
S_EDE_CBC_SHA
TLS_RSA_WITH_3DES_EDE_C
BC_SHA
TLS_ECDH_ECDSA_WITH_3D
ES_EDE_CBC_SHA
TLS_ECDH_RSA_WITH_3DES_
EDE_CBC_SHA
TLS_DHE_RSA_WITH_3DES_E
DE_CBC_SHA
TLS_DHE_DSS_WITH_3DES_E
DE_CBC_SHA
ECIM SSL/TLS (NETCONF TLS_ECDHE_ECDSA_WITH_A TLS_RSA_WITH_AES_128_CB
ER6000 Over TLS) ES_256_GCM_SHA384 C_SHA
Router8800 TLS_ECDHE_ECDSA_WITH_A
ES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_
256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_
128_GCM_SHA256
TLS_RSA_WITH_AES_256_GC
M_SHA384
TLS_RSA_WITH_AES_128_GC
M_SHA256
TLS_ECDH_ECDSA_WITH_AE
S_256_GCM_SHA384
TLS_ECDH_ECDSA_WITH_AE
S_128_GCM_SHA256
TLS_ECDH_RSA_WITH_AES_2
56_GCM_SHA384
TLS_ECDH_RSA_WITH_AES_1
28_GCM_SHA256
TLS_DHE_RSA_WITH_AES_25
6_GCM_SHA384
TLS_DHE_RSA_WITH_AES_12
8_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_A
ES_256_CBC_SHA384
TLS_ECDHE_ECDSA_WITH_A
ES_128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA256
TLS_RSA_WITH_AES_256_CB
C_SHA256
TLS_RSA_WITH_AES_128_CB
C_SHA256
TLS_ECDH_ECDSA_WITH_AE
S_256_CBC_SHA384
Platform Type ENM Supported TLS Protocol ENM Supported Ciphers in ENM Supported Ciphers in
TLSv1.2 TLSv1
TLS_ECDH_ECDSA_WITH_AE
S_128_CBC_SHA256
TLS_ECDH_RSA_WITH_AES_2
56_CBC_SHA384
TLS_ECDH_RSA_WITH_AES_1
28_CBC_SHA256
TLS_DHE_RSA_WITH_AES_25
6_CBC_SHA256
TLS_DHE_RSA_WITH_AES_12
8_CBC_SHA256
TLS_RSA_WITH_AES_128_CB
C_SHA
TLS_EMPTY_RENEGOTIATIO
N_INFO_SCSV
CPP CORBA over SSL TLS_ECDHE_RSA_WITH_AES_ TLS_ECDHE_RSA_WITH_AES_
256_GCM_SHA384 256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_ TLS_RSA_WITH_AES_256_CB
128_GCM_SHA256 C_SHA
TLS_RSA_WITH_AES_256_GC TLS_ECDHE_RSA_WITH_AES_
M_SHA384 128_CBC_SHA
TLS_RSA_WITH_AES_128_GC TLS_RSA_WITH_AES_128_CB
M_SHA256 C_SHA
TLS_DHE_RSA_WITH_AES_25 TLS_ECDHE_RSA_WITH_3DE
6_GCM_SHA384 S_EDE_CBC_SHA
TLS_DHE_RSA_WITH_AES_12 SSL_RSA_WITH_3DES_EDE_C
8_GCM_SHA256 BC_SHA
TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA384
TLS_ECDHE_RSA_WITH_AES_
256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA256
TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA
TLS_RSA_WITH_AES_256_CB
C_SHA256
TLS_RSA_WITH_AES_256_CB
C_SHA
TLS_RSA_WITH_AES_128_CB
C_SHA256
TLS_RSA_WITH_AES_128_CB
C_SHA
TLS_DHE_RSA_WITH_AES_25
6_CBC_SHA256
TLS_DHE_RSA_WITH_AES_12
8_CBC_SHA256
TLS_ECDHE_RSA_WITH_3DE
S_EDE_CBC_SHA
SSL_RSA_WITH_3DES_EDE_C
BC_SHA
TLS_EMPTY_RENEGOTIATIO
N_INFO_SCSV
Table 26
Platform Type ENM Supported Protocol ENM Supported Ciphers ENM Supported Protocol
Version and 3PP Version
CPP SSH/SFTP KEY EXCHANGE SSH-2.0-OpenSSH_7.4 in
ECIM ALGORITHMS: AMOS Service
curve25519-sha256
curve25519-
[email protected]
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-
exchange-sha256
Platform Type ENM Supported Protocol ENM Supported Ciphers ENM Supported Protocol
Version and 3PP Version
diffie-hellman-group16-
sha512
diffie-hellman-group18-
sha512
diffie-hellman-group-
exchange-sha1
diffie-hellman-group14-
sha256
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
ENCRYPTION ALGORITHMS:
chacha20-
[email protected]
aes128-ctr
aes192-ctr
aes256-ctr
[email protected]
[email protected]
aes128-cbc
aes192-cbc
aes256-cbc
MAC ALGORITHMS:
[email protected]
[email protected]
hmac-sha2-256-
[email protected]
hmac-sha2-512-
[email protected]
[email protected]
[email protected]
[email protected]
hmac-sha2-256
hmac-sha2-512
hmac-sha1
CPP SSH/SFTP KEY EXCHANGE SSH-2.0-OpenSSH_7.4 in
ECIM ALGORITHMS: SMRS Service
ER6000 curve25519-sha256
MINI-LINK Outdoor curve25519-
MINI-LINK Indoor [email protected]
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group-
exchange-sha256
diffie-hellman-group16-
sha512
diffie-hellman-group18-
sha512
diffie-hellman-group-
exchange-sha1
diffie-hellman-group14-
sha256
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
ENCRYPTION ALGORITHMS:
aes256-ctr
aes192-ctr
aes128-ctr
aes256-cbc
aes192-cbc
aes128-cbc
blowfish-cbc
cast128-cbc
3des-cbc
[email protected]
MAC ALGORITHMS:
hmac-sha2-512
hmac-sha2-256
hmac-ripemd160
Platform Type ENM Supported Protocol ENM Supported Ciphers ENM Supported Protocol
Version and 3PP Version
hmac-ripemd160-
[email protected]
hmac-sha1
hmac-md5
hmac-sha1-96
hmac-md5-96
[email protected]
CPP SSH/SFTP KEY EXCHANGE SSH-2.0-
ECIM ALGORITHMS: maverick_legacy_1.6.5
MINI-LINK Outdoor ecdh-sha2-nistp521
MINI-LINK Indoor ecdh-sha2-nistp384
ER6000 ecdh-sha2-nistp256
diffie-hellman-group-
exchange-sha256
diffie-hellman-group14-sha1
diffie-hellman-group-
exchange-sha1
diffie-hellman-group1-sha1
ENCRYPTION ALGORITHMS:
aes256-ctr
aes192-ctr
aes128-ctr
aes256-cbc
aes192-cbc
aes128-cbc
3des-cbc
arcfour
arcfour128
arcfour256
MAC ALGORITHMS:
hmac-sha2-256
hmac-sha2-512-96
hmac-sha2-512
hmac-sha2-256-96
hmac-sha1
hmac-sha1-96
hmac-md5
hmac-md5-96
hmac-sha256
[email protected]
hmac-sha512
[email protected]
CPP SSH/SFTP KEY EXCHANGE SSH-2.0-JSCH-0.1.53
ECIM ALGORITHMS:
ecdh-sha2-nistp256
ecdh-sha2-nistp384
ecdh-sha2-nistp521
diffie-hellman-group14-sha1
diffie-hellman-group-
exchange-sha256
diffie-hellman-group-
exchange-sha1
diffie-hellman-group1-sha1
ENCRYPTION ALGORITHMS:
aes128-ctr
aes128-cbc
3des-ctr
3des-cbc
blowfish-cbc
aes192-ctr
aes192-cbc
aes256-ctr
aes256-cbc
MAC ALGORITHMS:
hmac-md5
hmac-sha1
hmac-sha2-256
Platform Type ENM Supported Protocol ENM Supported Ciphers ENM Supported Protocol
Version and 3PP Version
hmac-sha1-96
hmac-md5-96
CPP SSH/SFTP KEY EXCHANGE SSH-2.0-JSCH-0.1.54
ECIM ALGORITHMS:
ecdh-sha2-nistp521
ecdh-sha2-nistp384
ecdh-sha2-nistp256
ENCRYPTION ALGORITHMS:
aes256-ctr
aes192-ctr
aes128-ctr
aes256-cbc
aes192-cbc
aes128-cbc
MAC ALGORITHMS:
hmac-sha2-256
hmac-sha1
Supported Network Element Types and Node Versions for Cipher Management
on Nodes
Cipher Management feature is supported for the following Network Element
types and supported NE release is mentioned in the table:
Table 27
Network Element Type NE Release
eNodeB Baseband Radio Node 17A onwards
NodeB Baseband Radio Node 17A onwards
GSM Baseband Radio Node 17A onwards
Baseband T (T605) 17A onwards
MAC_Algorithms
Router6672 17B onwards
Router6675 18A onwards
Router6x71 18A onwards
Router6274 18Q2GA onwards
Router6273 20.Q1 onwards
Router6673 21.Q3 onwards
MGW SSH Support - MGW6.8.6.0 onwards
TLS Support - MGW6.9.0.0 onwards
NodeB DU Radio Node SSH Support - W17.Q3 onwards
TLS Support - W17.Q4 onwards
eNodeB DU Radio Node (Micro &Macro RBS) SSH Support - L17.Q3 onwards
TLS Support - L17.Q4 onwards
vPP (ECIM) SSH Support - 17.Q3 onwards
TLS Support - 17.Q3 onwards
5GRadioNode (ECIM) SSH Support - 18.Q4 onwards
TLS Support - 18.Q4 onwards
Fronthaul 6020 20.Q2.1 onwards
Controller6610 21.EX1 onwards
Prerequisites
This section describes the procedure to set ciphers on the given nodes for
SSH, SFTP, SSL, TLS, and HTTPS protocols.
The Set Ciphers procedure facilitates user to enable, disable, and rank Key
Exchange Algorithms, Mac Algorithms, and Encryption Algorithms on the
nodes.
Actors
Authorized for: NodeSecurity_Administrator, Action: update
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Result
Successfully started a job to set ciphers for nodes. Perform secadm job get -j
<Job Id to get progress information.
The provided ciphers are set on nodes. To verify if the Set ciphers procedure on
nodes is successful, execute Get Ciphers on Nodes on page 384 command in ENM
CLI and verify Enabled Ciphers.
The Set Ciphers procedure facilitates user to enable, disable, and rank the
cipher suites on the nodes.
Internally node selects the cipher suites from its list of supported cipher suites
on the basis of the Cipher Filter value provided in the command by the operator.
The enabled cipher suites are ranked as per the order provided in the Cipher
Filter value in the command and the same cipher suites are used by the nodes for
establishing a secure communication. User can set ciphers suites on a single or
multiple nodes.
Notes:
— While setting ciphers for COM/ECIM nodes, make sure that the updating
cipher suites are supported by the node supported protocols mentioned in
the tables in Ciphers Management for Nodes on page 366.
— While setting ciphers for CPP nodes, make sure that the updating cipher
suites are supported by the node supported protocols mentioned in the
tables in Ciphers Management for Nodes on page 366.
Table 28
Cipher Suite KeyEx Authenti Encryption MAC CipherFilter
Name chang cation Format
e
TLS_RSA_WITH RSA RSA AES-256- SHA25 RSA-RSA-
_AES_256_CBC CBC 6 AES-256-
_SHA256 CBC-
SHA256
(In such cipher
suite both
KeyExchange
and
Authentication
— In the enabled ciphers on the node, there must be at least one cipher
suite in which the authentication algorithm is same as the server public key
algorithm.
Examples:
If DG2 node has been enrolled with ECDSA certificate, then at least one
cipher suite with authentication algorithm as ECDSA must be enabled on
node to establish TLS connection with ENM(CM Mediation). ECDSA ciphers
are supported for DG2 nodes from 18.Q4.
TLS connection between Radionodes and LDAP Server where Node is a TLS
Client and LDAP is a TLS Server.
Since LDAP server is enrolled with RSA certificate, it needs at least one cipher
suite with authentication algorithm as RSA enabled on the node to establish
TLS connection with LDAP server.
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
TLS_DHE_RSA_WITH_AES_256_CBC_SHA
TLS_RSA_WITH_AES_256_CBC_SHA
TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA
TLS_DHE_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_AES_128_CBC_SHA
TLS_RSA_WITH_3DES_EDE_CBC_SHA
Since the Firefox browser in the Element Manager supports only following
two TLSv1.2 strong cipher suites, the same two strong cipher suites must be
enabled on the Radionodes along with the other supported strong TLSv1.2
ciphers suites of operator choice to support the use cases associated with the
Element Manager GUI.
TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
Actors
Authorized for: NodeSecurity_Administrator, Action: update
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Result
Successfully started a job to set ciphers for nodes. Perform secadm job get -j
<Job Id> to get progress information.
The provided ciphers are set on nodes. To verify whether the Set ciphers
procedure on nodes is successful, execute Get Ciphers on Nodes on page 384
command in ENM CLI and verify Enabled Ciphers.
This section describes the XML template to configure ciphers on the given
nodes for respective SSH/SFTP and SSL/TLS/HTTPS protocols.
XML Template
This XML can be used to support setting of ciphers provided by operator for
respective protocol of the nodes as:
ciphersConfiguration
is the root element of the XML to configure ciphers on the
nodes.
keyExchangeCiphers
is the child element of sshProtocol.
1. Run the following XML code to define multiple nodes with same ciphers for
respective protocols.
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00002</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
</nodes>
<sshProtocol>
.....
</sshProtocol>
<tlsProtocol>
.....
</tlsProtocol>
2. Run the following XML code to define multiple nodes with different ciphers.
</tlsProtocol>
</nodeCiphers>
</ciphersConfiguration>
3. Run the following XML code to define multiple nodes with SSH protocol only.
4. Run the following XML code to define multiple nodes with SSH protocol and
single child element as keyExchange or encrypt or mac ciphers.
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<keyExchangeCiphers>
<cipher>hmac-sha2-512</cipher>
<cipher>hmac-sha2-256</cipher>
</keyExchangeCiphers>
</sshProtocol>
</nodeCiphers>
or
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<encryptCiphers>
<cipher>aes256-ctr</cipher>
<cipher>aes192-ctr</cipher>
</encryptCiphers>
</sshProtocol>
</nodeCiphers>
or
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<macCiphers>
<cipher>diffie-hellman-group-exchange-sha256</cipher>
<cipher>diffie-hellman-group14-sha1</cipher>
</macCiphers>
</sshProtocol>
</nodeCiphers>
5. Run the following XML code to define multiple nodes with SSH protocol and
two child elements as keyExchange and encrypt or keyExchange and mac or
encrypt and mac ciphers.
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<keyExchangeCiphers>
<cipher>hmac-sha2-512</cipher>
<cipher>hmac-sha2-256</cipher>
</keyExchangeCiphers>
<encryptCiphers>
<cipher>aes256-ctr</cipher>
<cipher>aes192-ctr</cipher>
</encryptCiphers>
</sshProtocol>
</nodeCiphers>
or
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<keyExchangeCiphers>
<cipher>hmac-sha2-512</cipher>
<cipher>hmac-sha2-256</cipher>
</keyExchangeCiphers>
<macCiphers>
<cipher>diffie-hellman-group-exchange-sha256</cipher>
<cipher>diffie-hellman-group14-sha1</cipher>
</macCiphers>
</sshProtocol>
</nodeCiphers>
or
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<sshProtocol>
<encryptCiphers>
<cipher>aes256-ctr</cipher>
<cipher>aes192-ctr</cipher>
</encryptCiphers>
<macCiphers>
<cipher>diffie-hellman-group-exchange-sha256</cipher>
<cipher>diffie-hellman-group14-sha1</cipher>
</macCiphers>
</sshProtocol>
</nodeCiphers>
6. Run the following XML code to define multiple nodes with TLS protocol only.
<nodeCiphers>
<nodes>
<nodeFdn>LTE04dg2ERBS00001</nodeFdn>
<nodeFdn>LTE04dg2ERBS00003</nodeFdn>
<nodeFdn>LTE04dg2ERBS00005</nodeFdn>
</nodes>
<tlsProtocol>
<cipherFilter>ALL</cipherFilter>
</tlsProtocol>
</nodeCiphers>
This procedure describes the steps to get the supported and enabled ciphers
on the given nodes for SSH, SFTP and SSL, HTTPS, and TLS protocol-based
communication.
Actors
Authorized for: NodeSecurity_Operator, Action: read
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
Results
The command lists the supported and enabled ciphers for a single node.
The command downloads the supported and enabled ciphers in CSV file format
into users Download folder for more than one node.
Write access to the IpSec MO and its children is permitted for the user with IPsec
Management task profile assigned.
IkePeer and IpSecTunnel MOs are children of IPsec MO, so they can only be
configured by user with IPsec Management task profile assigned.
For more information regarding the task profiles, see the section Task Profiles of
the document Security for O&M Node Access, Reference [18].
The ssu credentials are generated when the user logs on AMOS, WinFIOL GUI, or
WinFIOL CLI for the first time.
For the ssu credentials to be generated, an entity for each user must be created
in PKI.
This script holds good for users with at least one of the roles:
— ADMINISTRATOR
— OPERATOR
— Scripting_Operator
For each user, the script verifies the existence of a PKI End Entity. If the
EndEntity does not exist, the script creates it automatically.
If the user is an SLS user too, the password to provide to the user to download its
own certificate is the username of the user.
Steps
— SECURITY_ADMIN
— Scripting_Operator
3. Log on ENM as the new user and change the password if required.
4. Log on the General Scripting VM through SSH using the credentials of the
new created user (see the section Load Balancing for AMOS and General
Scripting VMs of the document ENM Operators Guide, Reference [5]).
cd /opt/ericsson/security/eeforamos
./setupEEForAMOSUsers.py
The option -aul followed by one or more users separated by comma (that is,
"user1, user2, user3") allows restricting the check and creation of EndEntity
only to the provided usernames.
The option -auf followed by a file name containing a set of username (in csv
format or in a column) allows restricting the check and creation of EndEntity
only to the provided username(s).
The option -nc avoids the script to change ENM PKI system. This can be
useful for test purposes.
usage: setupEEForAMOSUsers.py [-h] [-u USER] [-p PASSWORD] [-nc] [-enm ENMAD →
DRESS][-aul AMOSUSERLIST][-auf AMOSUSERFILE]
For each ENM User with AMOS roles, check if an associate EndEntity exists o →
n ENM PKI and create it if not.
optional arguments:
-h, --help show this help message and exit
-u USER, --user USER ENM username
-p PASSWORD, --password PASSWORD ENM username password
-nc, --nocreate only performs checks. PKI End Entity is not created →
. Test purpose
-enm ENMADDRESS, --enmaddress ENMADDRESS ENM address (enmapache.athtem.eei →
.ericsson.se)
-aul AMOSUSERLIST, --amosuserlist AMOSUSERLIST amos user list
-auf AMOSUSERFILE, --amosuserfile AMOSUSERFILE amos user file
— The user is created with all the required COM roles for
COM/ECIM based node.
Entity_Certificate_Profile.xml
<CertificateExtensions>
<CertificateExtension xsi:type="AuthorityKeyIdentifier">
<Critical>false</Critical>
<AuthorityKeyIdentifierType>ISSUER_DN_SERIAL_NUMBER</Authori →
tyKeyIdentifierType>
</CertificateExtension>
<CertificateExtension xsi:type="BasicConstraints">
<Critical>true</Critical>
<IsCA>false</IsCA>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectKeyIdentifier">
<Critical>false</Critical>
<KeyIdentifier>
<Algorithm>
<Name>160-BIT_SHA-1</Name>
</Algorithm>
</KeyIdentifier>
</CertificateExtension>
<CertificateExtension xsi:type="KeyUsage">
<Critical>true</Critical>
<SupportedKeyUsageType>DIGITAL_SIGNATURE</SupportedKeyUsageT →
ype>
<SupportedKeyUsageType>KEY_ENCIPHERMENT</SupportedKeyUsageTy →
pe>
<SupportedKeyUsageType>KEY_AGREEMENT</SupportedKeyUsageType>
</CertificateExtension>
<CertificateExtension xsi:type="SubjectAltName">
<Critical>false</Critical>
<SubjectAltNameField>
<Type>DIRECTORY_NAME</Type>
</SubjectAltNameField>
</CertificateExtension>
</CertificateExtensions>
<SubjectCapabilities>
<SubjectField>
<Type>COMMON_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SURNAME</Type>
</SubjectField>
<SubjectField>
<Type>COUNTRY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>LOCALITY_NAME</Type>
</SubjectField>
<SubjectField>
<Type>STATE</Type>
</SubjectField>
<SubjectField>
<Type>STREET_ADDRESS</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION</Type>
</SubjectField>
<SubjectField>
<Type>ORGANIZATION_UNIT</Type>
</SubjectField>
<SubjectField>
<Type>DN_QUALIFIER</Type>
</SubjectField>
<SubjectField>
<Type>TITLE</Type>
</SubjectField>
<SubjectField>
<Type>GIVEN_NAME</Type>
</SubjectField>
<SubjectField>
<Type>SERIAL_NUMBER</Type>
</SubjectField>
</SubjectCapabilities>
</CertificateProfile>
</Profiles>
Entity_Entity_Profile.xml
6. Rename the existing entity with a new name using the PKI Entity
Management UI app, if the entity exists.
The following XML must be used for Entity creation. Replace the %username%
with the username of the ENM user.
Entity.xml
If some entity created in the previous drop does not work, it is possible to
recreate them by the script.
— Log on with the user again and try to launch the AMOS. If it fails, remove
the ssucredential.xml file and try again.
In this way, such users automatically receive the X509 certificates needed to set
up a TLS communication channel toward nodes.
For more details about the script, see Configuring Users to Access AMOS, Element
Manager and WinFIOL Towards SL2 or TLS Enabled Nodes on page 386.
Prerequisites
— Knowledge of Linux operation and Cron schedule.
— Scripting_Operator role.
— Load must be balanced by the user across the available General Scripting
VMs not to overload the machine.
Warning
The maximum session (maxSessionTime) and idle (maxIdleTime) time
configured for the user impact how long the script is able to be run. It is
suggested to set them to the maximum value allowed (two years) using the
related IdAM REST interface.
For example, the following commands create the user scripting3 with the needed
privileges and the recommended settings:
For more info about the IdAM REST interface, see the document ENM Identity
and Access Management Programmers Guide, Reference [1].
Steps
*/10 * * * * /opt/ericsson/security/eeforamos/setupEEForAMOSUsers.py
This entry runs the script to create missing user entities every 10 minutes.
The role of the ENM system is to configure the Network Element with all
the data relevant to RTSEL communication and equip both external <syslog>
server and Network Element with certificates ensuring secure event dispatching.
The certificate for the external <syslog> server is generated using the offline
enrollment procedure.
See the section Offline Enrollment of External Syslog Server on page 398.
1. RTSEL Activation.
2. RTSEL Deactivation.
3. Deletion of RTSEL Configuration.
4. Get RTSEL Status.
If Cert Distribution and Enrollment have been already done on the node, it skips
these actions and continues with configuration and activation of RTSEL.
Prerequisites
— Enable the SHA1 algorithm to avoid the SCEP-based Cert Enrollment failure.
— Use the following command to check the algorithm status with user role
as:
— Create node credentials, if they do not exist. To create node credentials, see
the section Create Node Credentials on page 21.
— If CMPv2_VC enrollment mode has been selected, then make sure that Vendor
Credentials are imported to ENM.
Steps
1. Activate rtsel.
Run the ENM CLI command with RTSEL Activation XML file as input::
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, then rtsel is activated on node.
Results
If the secadm command for activation of rtsel is triggered successfully, the
following message is displayed:
Prerequisites
Steps
1. Deactivate rtsel.
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, rtsel is deactivated on the node.
For more details check the section Get Real Time Sec Log Attributes on CPP
Based NEs on page 400.
Results
If the secadm command for deactivation of rtsel is triggered successfully, the
following message is displayed:
Prerequisites
— ERBS and MGW nodes must support to perform RTSEL delete. The nodes
must have the NE defined.
Steps
Run the following ENM CLI command with RTSEL Deletion XML file as input:
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, external syslog servers are deleted on the node.
For more details, check the section Get Real Time Sec Log Attributes on CPP
Based NEs on page 400.
Results
If the secadm rtsel delete command is triggered successfully, the following
message is displayed:
Generate the CSR on External Syslog Server and this CSR must be signed by ENM
deployment.
Actors
Authorized for: PKI_EE_ADMINISTRATOR, Action : execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
— Replace %countryCode% with two letter country code in XML and save
it. See https://en.wikipedia.org/wiki/ISO_3166-2 for two letter country
codes. For example, IN.
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, external syslog servers are deleted on the node.
Example
pkiadm ctm EECert -l -en ERBS_1 -s active
Results
Certificate must be successfully generated on ENM deployment with provided
CSR.
16.5 Get Real Time Sec Log Attributes on CPP Based NEs
This procedure describes how to obtain attributes like syslog server, Feature
State on CPP based network elements.
Actors
Authorized for: NodeSecurity_Administrator, Action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
If the command is triggered successfully, the following message is displayed:
Sample Response:
This gives real-time feedback to detect the threats against the system. This is
done by collecting security events from all nodes. The content of the <syslog>
stream is identical to, or a subset of the Local Security and Audit Trail Logs.
The role of the ENM system is to configure the Network Element with all the data
relevant to RTSEL communication and equip both External <syslog> server and
Network Element with certificates ensuring secure event dispatching.
See the section Offline Enrollment of External Syslog Server on page 398.
1. RTSEL Activation.
2. RTSEL Deactivation.
3. Get RTSEL Status.
Prerequisites
— Network Elements must exist in the system.
— Node Credential and Trust Category are installed on the node. If not, perform
trust distribution and online enrollment on the node.
Steps
Example
cmedit set SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFun →
ctions=1,Lm=1,FeatureState=CXC4040010 featureState=ACTIVATED --force
SUCCESS FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,Lm=1,FeatureState=CXC4040010
Example
cmedit create SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,LogM=1,Log=SecurityLog,LogPushTransfer=TCP logPushTransferId=1, →
uri= "syslog://[2001:1b70:8210:9500::1c]"
FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFunction →
s=1,LogM=1,Log=SecurityLog,LogPushTransfer=1
logPushTransferId : 1
operationalState : null
password : null
transferType : BULK
uri : syslog://[2001:1b70:8210:9500::1c]
Example
cmedit set SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFun →
ctions=1,LogM=1,Log=SecurityLog,LogPushTransfer=1 transferType=STREAM
SUCCESS FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,LogM=1,Log=SecurityLog,LogPushTransfer=1
Example
cmedit set cmedit set SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME1 →
2,SystemFunctions=1,LogM=1 nodeCredential='SubNetwork=G2RBS,MeContext=MSME12 →
,ManagedElement=MSME12,SystemFunctions=1,SecM=1,CertM=1,NodeCredential=1', t →
rustCategory='SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,SecM=1,CertM=1,TrustCategory=1'
SUCCESS FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,LogM=1
Prerequisites
— Real-Time Security Event Logging is activated on the node.
Steps
Example
cmedit set SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFun →
ctions=1,Lm=1,FeatureState=CXC4040010 featureState=DEACTIVATED --force
SUCCESS FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,Lm=1,FeatureState=CXC4040010
Prerequisites
— Operator must have Cmedit_Administrator role.
Steps
Example
cmedit get SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFun →
ctions=1,Lm=1,FeatureState=CXC4040010
description : Real Time Security Event Logging
featureKey : [SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,System →
Functions=1,Lm=1,FeatureKey=CXC4040010_5]
featureState : ACTIVATED
featureStateId : CXC4040010
keyId : CXC4040010
licenseState : ENABLED
serviceState : OPERABLE
Example
cmedit get MSME12 LogPushTransfer.*
FDN : SubNetwork=G2RBS,MeContext=MSME12,ManagedElement=MSME12,SystemFunction →
s=1,LogM=1,Log=SecurityLog,LogPushTransfer=1
logPushTransferId : 1
operationalState : ENABLED
password : null
transferType : STREAM
uri : syslog://[2001:1b70:8210:9500::1c]
This gives real-time feedback to detect the threats against the system. This is
done by collecting security events from all nodes. The content of the <syslog>
stream is identical to, or a subset of the Local Security and Audit Trail Logs.
The role of the ENM system is to configure the Network Element with all the data
relevant to RTSEL communication and equip both External <syslog> server and
Network Element with certificates ensuring secure event dispatching.
See the section Offline Enrollment of External Syslog Server on page 398.
1. RTSEL Activation.
2. RTSEL Deactivation.
3. Get RTSEL Status.
Prerequisites
— Network Elements must exist in the system.
— Node Credential and Trust Category are installed on the node. If not, perform
trust distribution and online enrollment on the node.
Steps
3. List the log streams that are supported with Log Management Function.
>dn -m LogM
>(LogM=1)>show
(LogM=1)RemoteLogServer=security
(RemoteLogServer=security)>show
(RemoteLogServer=security)>configure
6. Configure nodecredential.
(config-RemoteLogServer=security)>nodeCredential="<fdn_of_OAM_NodeCredential →
>"
7. Configure trustcategory.
(config-RemoteLogServer=security)>trustCategory="<fdn_of_OAM_TrustCategory>"
(config-RemoteLogServer=security)>uri="<URI_Of_External_Syslog_Server>"
9. Commit the changes and verify that the log streaming is activated for
security logs operationalState is ENABLED.
(config-RemoteLogServer=security)>commit -s
(config-RemoteLogServer=security)>show
Results
After the successful activation of RTSEL, operationalState is ENABLED. The
following is the sample output for all the executed steps.
>dn -m LogM
ManagedElement=BSC004,SystemFunctions=1,LogM=1
(LogM=1)>show
LogM=1
Log=sec_auth
Log=security_audit
Log=saLogSystem
Log=kernel
Log=messages
Log=commonLogConfig
Log=FaultManagementCfgLogAlarmStream
Log=FaultManagementCfgLogAlertStream
Log=ComSecLogStream
Log=ComCliCmdLogStream
Log=ComSaCfgLogStream
Log=ComCfgLogStream
RemoteLogServer=regular
RemoteLogServer=security
(LogM=1)>RemoteLogServer=security
(RemoteLogServer=security)>show
RemoteLogServer=security
availStatus
OFF_LINE
operationalState=DISABLED
(RemoteLogServer=security)>configure
(config-RemoteLogServer=security)>nodeCredential="ManagedElement=BSC004,SystemFu →
nctions=1,SecM=1,CertM=1,NodeCredential=2"
(config-RemoteLogServer=security)>trustCategory="ManagedElement=BSC004,SystemFun →
ctions=1,SecM=1,CertM=1,TrustCategory=2"
(config-RemoteLogServer=security)>uri"10.74.143.10:10514"
(config-RemoteLogServer=security)>commit -s
(config-RemoteLogServer=security)>show
RemoteLogServer=security
nodeCredential="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,NodeCr →
edential=2"
operationalState=ENABLED
trustCategory="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,TrustCa →
tegory=2"
uri="10.74.143.10:10514"
(config-RemoteLogServer=security)>
Prerequisites
— Real-Time Security Event Logging is activated on the node.
Steps
(config-RemoteLogServer=security)>show
(config-RemoteLogServer=security)>no nodeCredential
(config-RemoteLogServer=security)>no trustCategory
(config-RemoteLogServer=security)>no uri
2. Commit the changes and verify that the availStatus is OFFLINE and the
operationalState is DISABLED.
(config-RemoteLogServer=security)>commit -s
(config-RemoteLogServer=security)>show
Results
After the successful deactivation of RTSEL, operationalState is DISABLED and
availStatus is OFFLINE. The following is the sample output for all the executed
steps.
(config-RemoteLogServer=security)>show
RemoteLogServer=security
nodeCredential="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,NodeCr →
edential=2"
operationalState=ENABLED
trustCategory="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,TrustCa →
tegory=2"
uri="10.74.143.10:10514"
(config-RemoteLogServer=security)>no nodeCredential
(config-RemoteLogServer=security)>no trustCategory
(config-RemoteLogServer=security)>no uri
(RemoteLogServer=security)>show
RemoteLogServer=security
availStatus
OFF_LINE
operationalState=DISABLED
Prerequisites
— Operator must have Cmedit_Administrator role.
Steps
1. List the log streams that are supported with Log Management Function, go
to RemoteLogServer=security from the list, and use show command to check
the availStatus and operationalState.
(LogM=1)>RemoteLogServer=security
(RemoteLogServer=security)>show
Example
When the RTSEL is deactivated:
>dn -m LogM
ManagedElement=BSC004,SystemFunctions=1,LogM=1
(LogM=1)>
(LogM=1)>RemoteLogServer=security
(RemoteLogServer=security)>show
RemoteLogServer=security
availStatus
OFF_LINE
operationalState=DISABLED
>dn -m LogM
ManagedElement=BSC004,SystemFunctions=1,LogM=1
(LogM=1)>
(LogM=1)>RemoteLogServer=security
(RemoteLogServer=security)>show
RemoteLogServer=security
nodeCredential="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,No →
deCredential=2"
operationalState=ENABLED
trustCategory="ManagedElement=BSC004,SystemFunctions=1,SecM=1,CertM=1,Tru →
stCategory=2"
uri="10.74.143.10:10514"
This task describes the steps required to update the ENM Trust Store to
include the required External CAs.
This procedure enables ENM to trust security enabled NEs that have been
configured with CA certificates, allowing these NEs to synchronize in ENM.
Prerequisites
The Operator must have the ENM roles: ADMINISTRATOR, SECURITY_ADMIN.
Steps
For each certificate copied, drag and drop the file to the ENM CLI and run the
command:
pkiadm extcalist
b. Open the file and obtain the Id attribute of the TrustProfile tag.
c. Create an XML file using the following template (ENM_SBI_FCTP_TP):
<Profiles>
<TrustProfile Id="{trust_profile_id}" Name="ENM_SBI_FCTP_TP">
<Modifiable>true</Modifiable>
<TrustCAChain>
<IsChainRequired>false</IsChainRequired>
<InternalCA>
<CertificateAuthority>
<Name>NE_OAM_CA</Name>
</CertificateAuthority>
</InternalCA>
</TrustCAChain>
<TrustCAChain>
<IsChainRequired>false</IsChainRequired>
<InternalCA>
<CertificateAuthority>
<Name>ENM_PKI_Root_CA</Name>
</CertificateAuthority>
</InternalCA>
</TrustCAChain>
<!--========== ADDED CERTIFICATE AUTHORITIES ====================-->
<ExternalCA>
<CertificateAuthority>
<Name>ROOT_CA_NAME</Name>
</CertificateAuthority>
</ExternalCA>
<!--=============================================================-->
</TrustProfile>
</Profiles>
f. Verify that the ENM_SBI_FCTP_TP Trust Profile has been updated with
the External CA.
Results
External CAs must be updated in the ENM_SBI_FCTP_TP Trust Profile.
This section describes the IP Security (IPsec) feature and its functionality.
The following are the two types of IPsec tunnels which can be established
between Node and Security Gateway:
— IPsec tunnel for Operation and Maintenance, for communication between
eNBS and ENM Infrastructures.
— IPsec tunnel for Traffic, for communication between eNBs and Private
Networks.
ENM PKI Management provides x.509 and trusted CA certificate support for
IPsec enabled Long Term Evolution (LTE) network, Core Network, and Security
Gateways (SEGs).
The communicating Traffic and O&M IPSec peers use provided certificates (ENM
PKI) while performing IKEv2 key negotiation.
— Activation and Deactivation of IPsec for OAM by using site basic file.
Disabling IPsec workflow deactivates the IPsec tunnel and then node is
integrated and it is operational. It carries OAM communication over the OAM
transport network.
Activate and Deactivate IPsec for OAM by Using Site Basic File
Once Activate IPsec for OAM is triggered using the site basic, it internally
performs the following sequence of steps.
See Activate or Deactivate IPsec Configuration for OAM by Using Site Basic
File on page 422 for more details.
See Get IPsec Current Status on page 424 to know how to retrieve the current
IPsec status information.
In Configuration1, there are different IpInterfaces for OAM and traffic. It means
that both OAM and Traffic have separate IpAccessHostEt (outer IP host).
Figure 44
Prerequisites
Actors
Authorized for: NodeSecurity_Administrator, PKI Administrator,
FM_Administrator, Cmedit_Administrator Action: activate
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
secadm ipsec
Results
— If the command is triggered successfully, the following message is displayed
in ENM CLI:
— IPsec tunnel for OAM must be established on the node. This can be verified
by using the command ikev2 ikesa after logging to the node.
— Node must be synchronized in ENM after IPsec tunnel establishment. Get the
sync status by using the command.
— Get the IPsec status by using secadm ipsec --status ENM CLI command. The
result of IPsec for OAM must be ACTIVATED.
— To monitor the IPsec Activation Status, see the section Monitor the IPsec
Activation Status on page 418.
This section describes how to monitor the IPsec activation status from the
Log Viewer.
Prerequisites
— No prerequisites.
Steps
1. Search with the keyword Node name and Workflow Name ( <Node_Name>
&& <CPPActivateIpSec>) in log viewer.
<ipAddressOaMInner>192.168.100.100</ipAddressOaMInner>
<networkPrefixLength>24</networkPrefixLength>
<ipAccessHostEtId>2</ipAccessHostEtId>
<defaultrouter0>10.10.10.1</defaultrouter0>
<ipAddressOaMOuter>192.168.100.217</ipAddressOaMOuter>
<remoteIpAddress>10.10.4.2</remoteIpAddress>
<remoteIpAddressMask>20</remoteIpAddressMask>
<peerOaMIpAddress>10.10.4.10</peerOaMIpAddress>
<peerIdentityIdFqdn>SeGW1.LTERAN.example.com</peerIdentityIdFqdn →
>
<peerIdentityIdType>IP_V4_ADDRESS</peerIdentityIdType>
<tsLocalIpAddressMask>24</tsLocalIpAddressMask>
<ipAddress>10.10.2.1</ipAddress>
<mask>0</mask>
</tsRemoteIpAddressRanges>
<ipSecTunnelAllowedTransforms>
<ipSecTunnelAllowedTransform>
<encryptionAlgorithm>AES_CBC_128</encryptionAlgorithm>
<integrityAlgorithm>HMAC_SHA_1_96</integrityAlgorithm>
</ipSecTunnelAllowedTransform>
</ipSecTunnelAllowedTransforms>
<ikePeerAllowedTransforms>
<ikePeerAllowedTransform>
<diffieHellmanGroup>GROUP_2</diffieHellmanGroup>
<encryptionAlgorithm>AES_CBC_128</encryptionAlgorithm>
<integrityAlgorithm>HMAC_SHA_1_96</integrityAlgorithm>
<pseudoRandomFunction>HMAC_SHA1</pseudoRandomFunction>
</ikePeerAllowedTransform>
</ikePeerAllowedTransforms>
<vid>1</vid>
</EnableOMConfiguration1>
</Node>
</Nodes>
, SUB_ALT_NAME_TYPE=IPV4}]]
Prerequisites
Actors
Authorized for: NodeSecurity_Administrator and Cmedit_Administrator Action:
deactivate
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
Results
— If the command is triggered successfully, the following message is displayed
in ENM CLI. See online help for more details.
— Node must be in SYNC with ENM after IPsec tunnel is up. Obtain the sync
status by using the command:
— Obtain the IPsec status by using secadm ipsec --status ENM CLI
command. The result of IPsec for OAM must be DEACTIVATED.
— To monitor the IPsec Deactivation Status, see the section Monitor the IPsec
Deactivation Status on page 421.
This section describes how to monitor the IPsec deactivation status from
the Log Viewer.
Prerequisites
— No prerequisites.
Steps
1. Search for keyword Node Name and Workflow Name ('LTE08ERBS00001 &&
CPPDeactivateIpSec') in log viewer.
</Node>
</Nodes>
, TRUST_ISSUER=null}]]
User can provide any supported configuration in the site basic file and it is user
responsibility to provide a valid site basic file for the respective configuration.
Prerequisites
Actors
Authorized for: NodeSecurity_Administrator, PKI Administrator,
FM_Administrator, Cmedit_Administrator Action: activate
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
secadm ipsec
Results
— If the command is triggered successfully, the following message is displayed
in ENM CLI:
— IPsec tunnel for OAM must be established on the node. This can be verified
by using the command ikev2 ikesa after logging to the node.
— Node must be synchronized in ENM after IPsec tunnel establishment. Get the
sync status by using the command.
ENM CLI command. The result of IPsec for OAM must be ACTIVATED.
— To monitor the IPsec Activation Status, see the section Monitor the IPsec
Activation Status on page 418.
Prerequisites
Actors
Authorized for: Node Security Administrator, Action: read
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Steps
Results
— If the command is triggered successfully, the following message is displayed
in ENM CLI:
ENM uses SSL/TLS protocol for secure communication with the nodes.
The following are the two new configuration parameters introduced to manage
the TLS protocol versions in ENM.
— enabledTLSProtocolsECIM: this configuration parameter is used to enable
or disable the TLS protocol versions (TLSv1.0, TLSv1.1, TLSv1.2) in ENM
for TLS communications between ECIM-based nodes and ENM. The default
value is TLSv1.2.
The following are the application use cases in which the previous configuration
parameters are used to enable or disable the TLS protocols:
Note: ENM must be upgraded to the same ISO to reflect the updated TLS
protocol version:
— if enabledTLSProtocolsCPP configuration parameter is
modified,
The following procedure allows the configuration of the ENM system to start
TLSv1.2 as the starting point always. The procedure to change the TLS protocol
version in the configuration is available in the section TLS Protocol Version
Update on page 428.
Note: Communication failure (sync fails) happens if the network contains the
CPP nodes with the version less than C16.2 EP18 or C17.0 EP5. Sync
failure happens only if the network has mentioned node versions and
the nodes are in SL2 or SL3.
Prerequisites
— This procedure must be applied only when the network has CPP Nodes with
the version > to VNF-LAF for cloud deployments.= > to VNF-LAF for cloud
deployments.= C16.2 EP18 or >= C17.0 EP5.
Steps
1. Connect to pkiraserv.
See Connect to a Service on page 2.
/ericsson/pkira/data/scripts/ConfigTlsPib.sh --readAll
Example
For CPP nodes:
5. Upgrade the ENM to same ISO to reflect the configuration parameter value
of enabledTLSProtocolsCPP and enabledTLSProtocolsECIM.
See the following document for ENM upgrade in physical and cloud
environments.
ENM supports CLI commands for enabling, disabling, and monitoring HTTP
over TLS for CPP nodes.
HTTP over TLS protocol is used by all ENM client services accessing CPP nodes
(ENM mediation, AMOS, and EM).
— ERBS
— RBS
— RNC
— Evo8300
— MGW
— HTTPS activation
— HTTPS deactivation
— HTTPS status.
Prerequisites
— User must have Node Security administrator role to trigger the HTTPS
activate command.
— Node must have alarms enabled (using the command: alarm enable
<node_name>).
Steps
or
or
Prerequisites
— User must have Node Security administrator role to trigger the HTTPS
deactivate command.
— Node must have alarms enabled (using the command alarm enable
<node_name>).
Steps
or
or
Table 30
Application Use Cases
SHM — Node Software upgrade in ENM.
— PM file recovery.
AMOS — Download Node logs from
Network Element.
Upgrade Independence — Node model retrieval from
Network Element.
OPS — Node upgrade via OPS on AXE
nodes.
Note: — SFTP is the default File Transfer Protocol on node. After activation
of FTPES on the node, File Transfer is performed using FTPES
protocol for the use cases mentioned in the table.
Actors
Authorized for: NodeSecurity_Administrator, Action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
— If the command is triggered successfully, the following message appears in
the ENM CLI:
— Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, then FTPES protocol is activated on nodes and ENM.
Actors
Authorized for: NodeSecurity_Administrator, Action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
— If the command is triggered successfully, the following message appears in
the ENM CLI.
— Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, then FTPES protocol is deactivated on nodes and ENM.
Actors
Authorized for: NodeSecurity_Operator, Action: execute
For more details about the capabilities, resources, and operations, see the ENM
Identity and Access Management System Administrator Guide, Reference [2].
Prerequisites
Steps
Results
Retrieve a table with FTPES status on nodes.
Steps
Note: The third field node password is not applicable for Gen2 nodes (it is
only applicable for Gen1), so, dummy value can be given in place of
the field.
Example
rbs1 10.1.10.5 x export_protocol=1,export_port=9921
Results
The ipdatabase file is updated.
If the ipdatabase file is not updated with node details, protocol and port details,
even though FTPES is activated on nodes using secadm ENM CLI command,
AMOS does not communicate using FTPES protocol during DCGM logs collection.
Steps
Note: The third field node password is not applicable for Gen2 nodes (it is
only applicable for Gen1), so, dummy value can be given in place of
the field.
Example
rbs1 10.1.10.5 x export_protocol=1,export_port=9921
Results
The ipdatabase file is updated.
If the ipdatabase file is not updated with node details, protocol and port details,
even though FTPES is activated on nodes using secadm ENM CLI command,
AMOS does not communicate using FTPES protocol during DCGM logs collection.
ENM can configure reliable time and date information on the node through
trusted NTP Server.
The authentication parameters secret key and digest algorithm must be set on
both node and NTP Server side. Using those authentication parameters, Network
Element and NTP Server are authenticated each other during time sync.
The following table describes the supported CPP and Baseband Radio Node
versions.
Table 31
neType Version
eNodeB >= 19.Q3
RBS >= 19.Q3
RNC >= 19.Q3
MGW >= 6.10.4.0
RadioNode >= 19.Q3
Prerequisites
— Nodes must exist in the system.
Steps
Node details are fetched from the command line input parameters, input text
file, or in the form of saved search or collection.
Job status must be COMPLETED and then check the workflow status. If it is
SUCCESS, then configuration of NTP Server details on node is completed. If
the workflow status is ERROR, see the document ENM Security Management
Troubleshooting Guide, Reference [10], for more details.
Node details are fetched from the command line input parameters, input text
file, or in the form of saved search or collection.
Results
If the command is triggered successfully, the following message is displayed:
If the Trusted NTP Server details are configured successfully on the NE, the
following command is used to verify nodes synchronization status with NTP
Server:
For G2 nodes, the Service status must be UNLOCKED and there must not be any
open alarms on the node after performing configure operation.
secadm ntp list command lists NTP key id, NTP Server Service Status, user
label, server Id, and server address of each NTP Server configured on the node.
Prerequisites
— Nodes must exist in the system.
Steps
Node details are fetched from the command line input parameters, input text
file, or in the form of saved search or collection.
Results
When secadm ntp list command runs from CLI, the response is in the
following format.
— If multiple valid and invalid nodes are provided, execution starts for valid
nodes and a table is displayed with the suggested solutions for invalid nodes.
— If all invalid nodes are provided, a table is displayed with the suggested
solutions for invalid nodes.
This command removes NTP Server on the node and the corresponding keyid
and nodeFdn mapping from the database of NTP Service, if that NTP Server
belongs to the same ENM. The input for the command can be a node list, node
file, or XML file, keyidlist, and serveridlist.
Prerequisites
— Nodes must exist in the system.
Steps
Node details are fetched from the command line input parameters, node
name, or XML file.
Node details are fetched from the command line input parameters, in the
input text file, or in the form of saved search or collection. See online help for
more details.
Results
If the command is triggered successfully, the following message is displayed:
All of the given input nodes are Valid. NTP remove workflow needs
to be executed. Perform secadm job get -j JOB_ID to get progress
information.
Renew can be used to replace the old key with new key for the particular
NTP Server on the node. This procedure is applicable only to renew the keys
which were installed using secadm ntp configure command in the same ENM
environment.
Prerequisites
— Nodes must exist in the system.
Steps
See the section Trusted NTP Server Configuration in ENM Operators Guide,
Reference [5].
Results
New keys are installed on the node.
The following command is used to verify nodes synchronization status with NTP
Server:
Figure 45
For G2 nodes, the Service status must be UNLOCKED and there must not be any
open alarms on the node after performing configure operation.
Figure 46
ENM applications use the secure TLS/SSH protocol communications towards the
node.
Currently, in ENM the weak and vulnerable ciphers are being used in
communications(SSH/TLS) towards the node.
The procedure to disable weak ciphers in ENM facilitates the operator to disable
the weak ciphers supported by ENM and enable the strong ciphers in the secure
communications.
The following configuration parameters can be used in ENM to disable the weak
ciphers:
— disableWeakAuthenticationAlgorithms
— disableWeakEncryptionAlgorithms
— disableWeakHashingAlgorithms
— disableWeakKeyexchangeAlgorithms
The values for the previous configuration parameters are defined as in the
following.
Currently, the following use cases do not support disabling of the weak
ciphers:
— Node connections opened through Element Manager GUI and
Winfiol.
Prerequisites
No prerequisites.
Steps
2. Upgrade of the ENM to same ISO must be done to reflect the configuration
parameter values in CPP, COMECIM mediations, LDAP, and AP secure
communications towards nodes.
For more information on the ENM upgrade in physical environment, see ENM
Upgrade Instructions, Reference [27].
For more information on the ENM upgrade in cloud environment, see ENM on
Cloud Upgrade Instructions, Reference [28].
For more information on the ENM upgrade in Cloud Native environment, see
Cloud Native ENM Upgrade Instructions, Reference [34].
This configuration parameter value is used by the NSCS IPsec Certificate and
Trust use cases to identify or create the correct Ikev2PolicyProfile MO by
matching value of Ikev2PolicyProfileId attribute of Ikev2PolicyProfile
MO.
Note: 1. Affected Use Cases are IPsec Certificate Issue and Reissue, Get
Certificate Enroll State, IPSec Trust Distribution, Get Trusted
Certificates Install State, and IPsec Cert Auto-Renewal.
2. If the value of the enforcedIKEv2PolicyProfileID configuration
parameter is NONE (default value), then:
— All the affected use cases work fine if only one
Ikev2PolicyProfile is present on the node.
— All the affected use cases are failed if more than one
Ikev2PolicyProfile is present on the node.
Prerequisites
— Refer the Notes for the allowed configuration parameter values, limitations,
affected Use Cases and different behaviors of the affected Use Cases with
the different enforcedIKEv2PolicyProfileID parameter values.
Steps
• COM roles and COM role aliases do not include target groups directly
in names (for example: “SOUTH:SystemAdministrator”). The user is
assigned COM role with target group.
• ENM does not support querying for COM role alias to COM roles
mapping.
• Centralized LDAP is not supported by ENM and Access Control for Nodes
supporting ECIM function. For nodes to work in AMOS without having
to enter username and password, Access Control for Nodes supporting
ECIM function must be configured on the node, which is integrated
through TLS, and the default ENM LDAP must be used.
2. Issue an IPsec node certificate in IPv6 network
When user verifies the post condition of issue a IPsec node certificate using
the command secadm certificate get on ENM CLI, the command does
not show the latest installed certificate. It is because of that ENM is not
updated with latest information on the node.
The user needs to run a resync operation before getting the certificate
information:
Initial enrollment using CMP protocol fails on Baseband Radio Node and
5GRadioNode as the ENM PKI system contains SerialNumber attribute in the
Subject DN field of CA and Entity Certificates.
This is because of the limitation on the node that it does not support
SerialNumber attribute in Subject DN field.
Note: User roles must be managed among secadm and cmedit users.
If the Issuer has already configured with SERIALNUMBER, then follow the
steps described in the section Enrollment for BaseBand RadioNode fails due
to the SERIALNUMBER attribute in the certificate of the document ENM
Security Troubleshooting Guide, Reference [10].
6. CRL check enable or disable ENM CLI command limitation for Baseband
Radio and Baseband Radio T node
When node has more than one Ikev2PolicyProfile MO, then CRL check
enable or disable using ENM CLI command does not work. In this case, user
needs to perform the following procedure to enable or disable CRL check.
Cmedit_Administrator
Sample output
FDN : ManagedElement=LTE04dg2ERBS00040,Transport=1
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,Synchronization=
1
FDN : ManagedElement=LTE04dg2ERBS00040,Transport=1,Sctp=1
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,QosProfiles=1
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,Ikev2PolicyProfil
e=1
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,Ikev2PolicyProfil
e=2
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,Ikev2PolicyProfil
e=1
FDN :
ManagedElement=LTE04dg2ERBS00040,Transport=1,Ikev2PolicyProfil
e=2
Example of output:
FDN : ManagedElement=LTE04dg2ERBS00040,Transport=1,Ikev2P →
olicyProfile=1
credential : ManagedElement=LTE04dg2ERBS00040,SystemFunct →
ions=1,SecM=1,CertM=1,NodeCredential=ipsecNodeCredential
dpdTime : 60
ikeDscp : 48
ikeSaLifetime : 1440
ikev2PolicyProfileId : 1
ikev2Proposal : null
reservedBy : null
trustCategory : ManagedElement=LTE04dg2ERBS00040,SystemFu →
nctions=1,SecM=1,CertM=1,TrustCategory=ipsecTrustCategory
userLabel :
1 instance(s)
c. To enable and disable the CRL check, run the following cmedit set
command.
The output of the command shown in step b is partially used as input for
this step.
For enable:
For disable:
7. Perform sync operation on the node to list the trust certificates after trust
Removal for BSC nodes.
Perform action sync of the node using the following command and then list
the trusted certificates:
8. IPsec certificate enrollment for Baseband Radio nodes with ECDSA keys.
When ECDSA is chosen to enroll IPsec certificate from ENM PKI, Baseband
Radio node receives a certificate chain with the following form:
— Root and SubCA certificates are with RSA keys.