Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual page 35

Managing vulnerability assessment
Table of Contents

Advertisement

Both of these files must be in PEM format. For examples of these files, see
Example Of TrustedCA.pem File
Copy the two PEM files to your STRM system, either to the root user's home
Step 2
directory or to a new directory created for the certificates. Make sure the filename
allows you to easily distinguish the CA certificate file from the private key chain file.
On the STRM host, change the directory to where the two PEM files are copied.
Step 3
Enter the following command:
Step 4
/opt/qradar/bin/foundstone-cert-import.sh <TrustedCA.pem>
<Portal.pem>
Where:
<TrustedCA.pem>
<Portal.pem>
The output may resemble the following:
Certificate was added to keystore
Using keystore-file : /opt/qradar/conf/foundscan.keystore
One certificate, no chain.
Key and certificate stored.
Alias:Portal.pem
Contents of Trust Store:
Keystore type: jks
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: trustedca.pem
Creation date: Mar 8, 2007
Entry type: trustedCertEntry
Owner: CN=Foundstone CA
Issuer: CN=Foundstone CA
Serial number: 0
Valid from: Fri Sep 12 20:29:11 ADT 2003 until: Mon Oct 20
20:29:11 ADT 2008 Certificate fingerprints:
MD5:
SHA1:
37:C3:48:36:87:B0:F2:41:48:6A:A2:F6:43:B7:76:55:92:C5:6E:11
*******************************************
*******************************************
Content of Key Store:
Keystore type: jks
Keystore provider: SUN
Your keystore contains 1 entry
Managing Vulnerability Assessment
and
Example of Portal.pem
is the CA certificate filename.
is the private keychain PEM file.
Password:foundscan
14:7E:68:02:38:EC:A5:A8:AE:3D:3C:C6:F5:F6:33:6C
Importing Custom Certificates
File.
33

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents