ADC

Use case: Configure the automatic DNSSEC key management feature

Use the following steps to enable the auto rollover feature on a non-GSLB site.

Note

Use this procedure if you have a DNS deployment on a NetScaler and not required to replicate it on other devices.

In this example, we have used the following details:

  • Domain name: example.com
  • Origin Server: nameserver1.example.com
  • NameServer: nameserver2.example.com
  • Contact: admin.example.com
  • Keys: Key 1 for ZSK and Key 2 for KSK
  1. Create SOA and NS record (name is to be the same as zone name)

    At the command prompt, type:

    add dns soaRec example.com -originServer nameserver1.example.com -contact admin.example.com
  2. Create a DNS zone record. Set the proxy mode to No for authoritative zones.

    add dns zone example.com -proxyMode no
  3. Create DNS keys

    Note:

    The command creates three files in the system with the filename prefix: private, key, and ds.

    create dns key -zoneName example.com -fileNamePrefix Key1.zsk -keytype zsk -keysize 1024 -algorithm rsASHA256 create dns key -zoneName example.com -fileNamePrefix Key2.ksk -keytype ksk -keysize 1024 -algorithm rsASHA256
  4. Publish the keys in the zone.

    Note:

    Enable the automatic rollover option and specify the expiration date, along with the notification period. A warning message is displayed regarding the activation of the key.

    add dns key Key1.zsk Key1.zsk.key Key1.zsk.private -autoRollover enABLED -expires 30 days -notificationPeriod 7 days -rolloverMethod doublesignature Warning: The key should be in an activated state for rollover. Please use sign DNS zone operation to activate the key Done add dns key Key2.ksk Key2.ksk.key Key2.ksk.private -autoRollover enABLED -expires 120 days -notificationPeriod 15 days -rolloverMethod doublerrSet Warning: The key should be in an activated state for rollover. Please use sign DNS zone operation to activate the key Done
  5. Activate the key using the sign zone command.

    sign dns zone example.com -keyName Key1.zsk Key2.ksk

  6. Update the DS record for the new key in the parent zone.

  7. Enable the auto-save key option in DNS parameters.

    set dns parameter -autosaveKeyOps enABLED

Note:

To ensure timely monitoring of all key activity, an SNMP alarm is sent. The SNMP alarms are sent for newly generated keys once the active keys are deleted.

Use case: Configure the automatic DNSSEC key management feature