Appendix
Sample commands with their outputs:
Run the script
root@ns# pwd
/var/safenet/config
root@ns# sh safenet_config
<!--NeedCopy-->
Create a certificate
root@ns# cd /var/safenet/safenet/lunaclient/bin
root@ns# ./vtl createcert -n 10.102.59.175
Private Key created and written to: /var/safenet/safenet/lunaclient/cert/client/10.102.59.175Key.pem
Certificate created and written to: /var/safenet/safenet/lunaclient/cert/client/10.102.59.175.pem
<!--NeedCopy-->
Copy the certificate to the HSM
root@ns# scp /var/safenet/safenet/lunaclient/cert/client/10.102.59.175.pem admin@10.217.2.7:
admin@10.217.2.7's password:
10.102.59.175.pem 100% 818 0.8KB/s 00:00
<!--NeedCopy-->
Copy the certificate and key from the HSM to the Citrix ADC appliance
root@ns# scp admin@10.217.2.7:server.pem /var/Thales Luna/safenet/lunaclient/server.2.7.pem
admin@10.217.2.7's password:
server.pem 100% 1164 1.1KB/s 00:01
<!--NeedCopy-->
Use SSH to connect to the Thales Luna HSM
ssh admin@10.217.2.7
Connecting to 10.217.2.7:22...
Connection established.
To escape to local shell, press 'Ctrl+Alt+]'.
Last login: Thu Jun 23 02:20:29 2016 from 10.252.243.11
Luna SA 5.2.3-1 Command Line Shell - Copyright (c) 2001-2014 SafeNet, Inc. All rights reserved.
[Safenet1] lunash:>hsm login
Please enter the HSM Administrators' password:
> *******
'hsm login' successful.
Command Result : 0 (Success)
[Safenet1] lunash:>
<!--NeedCopy-->
Register the Citrix ADC on the Thales Luna HSM
[Safenet1] lunash:>client register -client ns175 -ip 10.102.59.175
'client register' successful.
Command Result : 0 (Success)
[Safenet1] lunash:>
<!--NeedCopy-->
Assign the client a partition from the partition list
[Safenet1] lunash:>client assignPartition -client ns175 -partition p2
'client assignPartition' successful.
Command Result : 0 (Success)
[Safenet1] lunash:>
<!--NeedCopy-->
Register the HSM with its certificate on the Citrix ADC
root@ns# ./vtl addserver -n 10.217.2.7 -c /var/safenet/safenet/lunaclient/server.2.7.pem
New server 10.217.2.7 successfully added to server list.
<!--NeedCopy-->
Verify the network trust links (NTLs) connectivity between the ADC and HSM
root@ns# ./vtl verify
The following Luna SA Slots/Partitions were found:
Slot Serial # Label
==== ================ =====
0 477877010 p2
<!--NeedCopy-->
Save the configuration
root@ns# cp /etc/Chrystoki.conf /var/safenet/config/
<!--NeedCopy-->
Configure automatic start of the gateway daemon at boot time
touch /var/safenet/safenet_is_enrolled
<!--NeedCopy-->
Appendix
In this article
- Run the script
- Create a certificate
- Copy the certificate to the HSM
- Copy the certificate and key from the HSM to the Citrix ADC appliance
- Use SSH to connect to the Thales Luna HSM
- Register the Citrix ADC on the Thales Luna HSM
- Assign the client a partition from the partition list
- Register the HSM with its certificate on the Citrix ADC
- Verify the network trust links (NTLs) connectivity between the ADC and HSM
- Save the configuration
- Configure automatic start of the gateway daemon at boot time
Copied!
Failed!