Administration Guide › Tools to Manage CA Directory › DSA Console › Secure the DSA Console with TLSclient
Secure the DSA Console with TLSclient
The TLSclient utility establishes an encrypted tunnel between the remote console client and the DSA. This keeps the session secure. We recommend that you use TLSclient.
To set up TLSclient to work with the DSA Console
- Stop the DSA.
- Create the TLSclient configuration file and include the following line in the file:
inPort outPort remoteAddress
In this line, the variables stand for the following:
- inPort
The port on the client computer that is used for tunneling.
- outPort
The remote-console-port on the server.
- remoteAddress
The host name of the server running the console you want to connect to.
Here is an example for the sample Democorp DSA running on the server computer:
19390 19395 hostname.ca.com
- Save the new file on the client computer in this location: DXHOME/config/tlsclient/tlsclient.cfg.
- Configure a DSA Console Using DXmanager.
- Install and start the TLS client:
- Install TLSclient to the system services using the following command:
tlsclient install tlsclient-server-name -ca certificate-file
- Start the TLSclient instance using the following command:
tlsclient start tlsclient-server-name
- Start the DSA.
- Test the connection:
- Open a Telnet window on the client computer.
- Connect to the inPort (defined in tlsclient.cfg) on the local computer.
- In the Democorp sample, this is 19390.
- Enter the console password when prompted.
You now have a fully-functioning SSL-encrypted connection to the console on the server computer.
- Verify that the connection works correctly:
- Start TLSclient with the debug option.
- On the DSA set tracing on using the following command:
trace full;
- Use a packet-snooping application.