ADC

Use case: Configure the automatic DNSSEC key management feature

Use the following steps to enable the auto rollover feature on a non-GSLB site.

Note

Use this procedure if you have a DNS deployment on a NetScaler and not required to replicate it on other devices.

In this example, we have used the following details:

  • Domain name: example.com
  • Origin Server: nameserver1.example.com
  • NameServer: nameserver2.example.com
  • Contact: admin.example.com
  • Keys: Key 1 for ZSK and Key 2 for KSK
  1. Create SOA and NS record (name is to be the same as zone name)

    At the command prompt, type:

    add dns soaRec example.com -originServer nameserver1.example.com -contact admin.example.com
    <!--NeedCopy-->
    
  2. Create a DNS zone record. Set the proxy mode to No for authoritative zones.

    add dns zone example.com  -proxyMode no
    <!--NeedCopy-->
    
  3. Create DNS keys

    Note:

    The command creates three files in the system with the filename prefix: private, key, and ds.

    create dns key -zoneName example.com -fileNamePrefix Key1.zsk -keytype zsk -keysize 1024 -algorithm rsASHA256
    create dns key -zoneName example.com -fileNamePrefix Key2.ksk -keytype ksk -keysize 1024 -algorithm rsASHA256
    <!--NeedCopy-->
    
  4. Publish the keys in the zone.

    Note:

    Enable the automatic rollover option and specify the expiration date, along with the notification period. A warning message is displayed regarding the activation of the key.

    add dns key Key1.zsk Key1.zsk.key Key1.zsk.private -autoRollover enABLED -expires 30 days -notificationPeriod 7 days -rolloverMethod doublesignature
    
    Warning: The key should be in an activated state for rollover. Please use sign DNS zone operation to activate the key
    Done
    
     add dns key Key2.ksk Key2.ksk.key Key2.ksk.private -autoRollover enABLED -expires 120 days -notificationPeriod 15 days -rolloverMethod doublerrSet
    
    Warning: The key should be in an activated state for rollover. Please use sign DNS zone operation to activate the key
    Done
    <!--NeedCopy-->
    
  5. Activate the key using the sign zone command.

    sign dns zone example.com -keyName Key1.zsk Key2.ksk

  6. Update the DS record for the new key in the parent zone.

  7. Enable the auto-save key option in DNS parameters.

    set dns parameter -autosaveKeyOps enABLED

Note:

To ensure timely monitoring of all key activity, an SNMP alarm is sent. The SNMP alarms are sent for newly generated keys once the active keys are deleted.

Use case: Configure the automatic DNSSEC key management feature

In this article