<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Can't import SSL certificates: &amp;quot;Could not parse the PEM-encoded import data&amp;quot; in ICX Switches</title>
    <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/45445#M3299</link>
    <description>&lt;P&gt;People suggested how to do it. Here is an example that I tested and is working on my Brocade ICX6610-48P. Although &lt;FONT face="courier new,courier"&gt;ip ssl cert-key-size&lt;/FONT&gt; says "&lt;EM&gt;SSL server certificate key size (range: 2048 or 4096)&lt;/EM&gt;" I found this only worked with 2048 sized keys. It also &lt;A href="https://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-securityguide/GUID-E83AC70A-9F89-4209-B6C4-ED5725D4F487.html" target="_self"&gt;says in the documentation&lt;/A&gt; that it can be up to 4096 bits but that's not necessarily true. I guess it depends on the device, maybe newer models can support larger keys. Using 4096 for the CA is okay though.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create new Root CA&amp;nbsp;&lt;PRE&gt;printf "\e[32mGenerate new "$name" Root CA\e[0m\n" \
pass='{{ pass }}' \
name='{{ name }}' \
openssl req \
    -newkey rsa:4096 \
    -sha512 \
    -passin pass:"${pass}" \
    -x509 \
    -nodes \
    -keyout "$name"Root.pem \
    -new \
    -out "$name"Root.crt \
    -subj "/CN="$name" Root CA" \
    -days 3650&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Generate key in PKCS#1 format. Use the &lt;FONT face="courier new,courier"&gt;-traditional&lt;/FONT&gt;, see &lt;A href="https://www.openssl.org/docs/manmaster/man1/openssl-genrsa.html" target="_blank" rel="noopener"&gt;openssl-genrsa&lt;/A&gt; for more details.&amp;nbsp;&lt;PRE&gt;openssl genrsa -traditional -out keyfile 2048&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Export public key (not strictly necessary)&amp;nbsp;&lt;PRE&gt;openssl rsa -traditional -in keyfile -pubout -out keyfile.public&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Create certificate sign request&amp;nbsp;&lt;PRE&gt;name='{{ name }}' \
C='{{ country }}' \
ST='{{ state/province }}' \
openssl req \
    -new \
    -sha512 \
    -key keyfile \
    -subj "/C="$C"/ST="$ST"/O="$name" Network, Inc./CN=sw1.home.arpa" \
    -out certsignreq.csr \
    -reqexts SAN \
    -extensions SAN \
    -config &amp;lt;(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Sign certificate request&amp;nbsp;&lt;PRE&gt;name='{{ name }}' \
openssl x509 \
    -req \
    -in certsignreq.csr \
    -CA "$name"Root.crt \
    -CAkey "$name"Root.pem \
    -CAcreateserial \
    -out certfile \
    -days 3650 \
    -sha512 \
    -extensions v3_ext \
    -extensions SAN \
    -extfile &amp;lt;(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Run the commands on the switch&amp;nbsp;&lt;PRE&gt;conf t
crypto-ssl certificate zeroize
ip ssl cert-key-size 2048
ip ssl certificate-data-file tftp 192.168.1.51 certfile
ip ssl private-key-file tftp 192.168.1.51 keyfile
web-management https&lt;/PRE&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
    <pubDate>Sun, 03 Jul 2022 15:52:53 GMT</pubDate>
    <dc:creator>DGray</dc:creator>
    <dc:date>2022-07-03T15:52:53Z</dc:date>
    <item>
      <title>Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18549#M681</link>
      <description>I'm trying to import an RSA private key and X.509 server certificate into an ICX6450-C12-PD running FastIron&amp;nbsp;08.0.30u as follows:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;PRE alt="" name="" rel="" target="" title="" type="" value=""&gt;(config)#ip ssl private-key-file tftp 1.2.3.4 key.pem&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Downloading RSA private key file, please wait...
Done.
Download RSA certificate data file to create the certificate.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;(config)#ip ssl certificate-data-file tftp 1.2.3.4 cert.pem
Downloading RSA certicate data file, please wait...
Done.

Creating certificate, please wait...
&lt;/PRE&gt;This consistently fails with error:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;PRE alt="" name="" rel="" target="" title="" type="" value=""&gt;Cert import failed....Could not parse the PEM-encoded import data&lt;/PRE&gt;Things I've tried:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;UL alt="" name="" rel="" target="" title="" type="" value=""&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;2048-bit and 1024-bit RSA keys&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Encrypted and unencrypted keys&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;SHA-256 and SHA-1 signatures&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;v3 and v1 certificates&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Bare-minimum certificates without any extensions&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;Subject Name fields matching Brocade defaults&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;LF and CRLF line endings&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;No line breaks at all&lt;/LI&gt;&lt;/UL&gt;Is this feature even functional at all? Neither the Command Reference nor the Security Configuration Guide specify supported file formats, but my test cases have covered even the most legacy, compatible extremes without success.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 23 Jun 2020 22:33:10 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18549#M681</guid>
      <dc:creator>nick_chevsky</dc:creator>
      <dc:date>2020-06-23T22:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18550#M682</link>
      <description>Hello&amp;nbsp;&lt;A alt="" href="https://forums.ruckuswireless.com/ruckuswireless/people/nick_chevsky" name="" rel="nofollow" target="" title="Link httpsforumsruckuswirelesscomruckuswirelesspeoplenick_chevsky" type="" value=""&gt;basteagow&lt;/A&gt;,&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Have you already tried with the filename without extensions, like the one below.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;(config)#ip ssl certificate-data-file tftp 192.168.9.210 certfile&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;(config)#ip ssl private-key-file tftp 192.168.9.210 keyfile&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;We would need a debugging session to have a better understanding of the problem, Could you please open a tac case.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Jijo</description>
      <pubDate>Wed, 24 Jun 2020 04:29:13 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18550#M682</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2020-06-24T04:29:13Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18551#M683</link>
      <description>I have, yes, but the filenames aren't the problem—the switch is successfully downloading both files, and the TFTP server's logs confirm this.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;I tried enabling&amp;nbsp;&lt;CODE alt="" name="" rel="" target="" title="" type="" value=""&gt;debug ip ssl&lt;/CODE&gt;, but no log entries are generated during the import process. Is there somewhere else I can look for debug info?&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Can you post a sample key/certificate pair that successfully imports for you, and specify the switch model and FastIron version on which it succeeds? If your files fail to import for me, we can then narrow this down further.</description>
      <pubDate>Wed, 24 Jun 2020 18:07:30 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18551#M683</guid>
      <dc:creator>nick_chevsky</dc:creator>
      <dc:date>2020-06-24T18:07:30Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18552#M684</link>
      <description>Hi B&lt;A alt="" href="https://forums.ruckuswireless.com/ruckuswireless/people/nick_chevsky" name="" rel="nofollow" target="" title="" type="" value=""&gt;asteagow&lt;/A&gt;,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;This forum is only for quick questions, For config review and file sharing we would appreciate if a tac case can be opened. This will help us to look into the problem remotely and debug live.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Jijo</description>
      <pubDate>Thu, 25 Jun 2020 06:42:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18552#M684</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2020-06-25T06:42:41Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18553#M685</link>
      <description>I opened case #&amp;nbsp;01074612 but was rejected due to not having a support contract.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Considering how many different combinations of key and certificate types I've tried (all of which match what the documentation claims is supported), I'm very confident that this is either a bug or something that should be better documented—and in either case, the certificate import code should at the very least be printing more useful, granular error messages.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;If this feature was implemented well, I wouldn't be needing support in the first place. Could you guys make an exception to the support contract requirement and see if this works on your end?&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks very much in advance!</description>
      <pubDate>Thu, 25 Jun 2020 21:18:52 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18553#M685</guid>
      <dc:creator>nick_chevsky</dc:creator>
      <dc:date>2020-06-25T21:18:52Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18554#M686</link>
      <description>I finally figured this out. The problem was that, for the RSA private key, FastIron doesn't support PKCS #8 ("&lt;CODE alt="" name="" rel="" target="" title="" type="" value=""&gt;-----BEGIN PRIVATE KEY-----&lt;/CODE&gt;"); it only supports PKCS #1 ("&lt;CODE alt="" name="" rel="" target="" title="" type="" value=""&gt;-----BEGIN RSA PRIVATE KEY-----&lt;/CODE&gt;").&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Most modern certification authorities use the PKCS #8 standard for private keys, which supports any cryptographic algorithm and prefixes the key with an ASN.1 value that specifies the key's type (&lt;I alt="" name="" rel="" target="" title="" type="" value=""&gt;1.2.840.113549.1.1.1&lt;/I&gt; for RSA). FastIron chokes on this—it only expects an RSA key in the ancient PKCS #1 format, which is RSA-specific and not future-proof.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;There are several things wrong here:&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;OL alt="" name="" rel="" target="" title="" type="" value=""&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;FastIron prints the same misleading error message (&lt;I alt="" name="" rel="" target="" title="" type="" value=""&gt;"Cert import failed"&lt;/I&gt;) even when the problem was—as in this case—with the private key; not the certificate.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;The second part of the error message (&lt;I alt="" name="" rel="" target="" title="" type="" value=""&gt;"Could not parse the PEM-encoded import data"&lt;/I&gt;) further misleads one to believe the issue is on the outer layer, when the problem is actually at the ASN.1 level.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;FastIron devices are the only hardware on our network that doesn't support PKCS #8 private keys.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;/LI&gt;&lt;LI alt="" name="" rel="" target="" title="" type="" value=""&gt;The facts that (a) only PKCS #1 is supported and (b) PKCS #8 is not supported are not documented anywhere. Please add this to the manuals, at the very least.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Sat, 27 Jun 2020 01:48:32 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18554#M686</guid>
      <dc:creator>nick_chevsky</dc:creator>
      <dc:date>2020-06-27T01:48:32Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18555#M687</link>
      <description>Hi B&lt;A alt="" href="https://forums.ruckuswireless.com/ruckuswireless/people/nick_chevsky" name="" rel="nofollow" target="" title="" type="" value=""&gt;asteagow&lt;/A&gt;,&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks for the insights and i'm glad you figured it out.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;We'll review these inputs internally and see how we can overcome this,ICX6450 is a legacy and an EOS product hence the new changes are very unlikely.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Thanks&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;Jijo&amp;nbsp;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Wed, 01 Jul 2020 07:33:11 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18555#M687</guid>
      <dc:creator>jijo_panangat</dc:creator>
      <dc:date>2020-07-01T07:33:11Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18556#M688</link>
      <description>Same issue on ICX7150 running 08.0.90d (UFI)&amp;nbsp; Like Basteagow, I needed to use the PKCS #1 format for this to work.&amp;nbsp; I also found that it is not documented.&lt;BR /&gt;&lt;BR /&gt;I would like to sincerely thank Basteagow for spending the time to figure this out, and express my hope that the documents are updated to prevent others from having to go through the same process of trial and error.</description>
      <pubDate>Fri, 14 Aug 2020 17:29:19 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/18556#M688</guid>
      <dc:creator>timothy_harryma</dc:creator>
      <dc:date>2020-08-14T17:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Can't import SSL certificates: "Could not parse the PEM-encoded import data"</title>
      <link>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/45445#M3299</link>
      <description>&lt;P&gt;People suggested how to do it. Here is an example that I tested and is working on my Brocade ICX6610-48P. Although &lt;FONT face="courier new,courier"&gt;ip ssl cert-key-size&lt;/FONT&gt; says "&lt;EM&gt;SSL server certificate key size (range: 2048 or 4096)&lt;/EM&gt;" I found this only worked with 2048 sized keys. It also &lt;A href="https://docs.ruckuswireless.com/fastiron/08.0.60/fastiron-08060-securityguide/GUID-E83AC70A-9F89-4209-B6C4-ED5725D4F487.html" target="_self"&gt;says in the documentation&lt;/A&gt; that it can be up to 4096 bits but that's not necessarily true. I guess it depends on the device, maybe newer models can support larger keys. Using 4096 for the CA is okay though.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create new Root CA&amp;nbsp;&lt;PRE&gt;printf "\e[32mGenerate new "$name" Root CA\e[0m\n" \
pass='{{ pass }}' \
name='{{ name }}' \
openssl req \
    -newkey rsa:4096 \
    -sha512 \
    -passin pass:"${pass}" \
    -x509 \
    -nodes \
    -keyout "$name"Root.pem \
    -new \
    -out "$name"Root.crt \
    -subj "/CN="$name" Root CA" \
    -days 3650&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Generate key in PKCS#1 format. Use the &lt;FONT face="courier new,courier"&gt;-traditional&lt;/FONT&gt;, see &lt;A href="https://www.openssl.org/docs/manmaster/man1/openssl-genrsa.html" target="_blank" rel="noopener"&gt;openssl-genrsa&lt;/A&gt; for more details.&amp;nbsp;&lt;PRE&gt;openssl genrsa -traditional -out keyfile 2048&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Export public key (not strictly necessary)&amp;nbsp;&lt;PRE&gt;openssl rsa -traditional -in keyfile -pubout -out keyfile.public&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Create certificate sign request&amp;nbsp;&lt;PRE&gt;name='{{ name }}' \
C='{{ country }}' \
ST='{{ state/province }}' \
openssl req \
    -new \
    -sha512 \
    -key keyfile \
    -subj "/C="$C"/ST="$ST"/O="$name" Network, Inc./CN=sw1.home.arpa" \
    -out certsignreq.csr \
    -reqexts SAN \
    -extensions SAN \
    -config &amp;lt;(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Sign certificate request&amp;nbsp;&lt;PRE&gt;name='{{ name }}' \
openssl x509 \
    -req \
    -in certsignreq.csr \
    -CA "$name"Root.crt \
    -CAkey "$name"Root.pem \
    -CAcreateserial \
    -out certfile \
    -days 3650 \
    -sha512 \
    -extensions v3_ext \
    -extensions SAN \
    -extfile &amp;lt;(cat /etc/ssl/openssl.cnf ; printf "[SAN]\nsubjectAltName=DNS:%s" "sw1.home.arpa")&lt;/PRE&gt;&lt;/LI&gt;&lt;LI&gt;Run the commands on the switch&amp;nbsp;&lt;PRE&gt;conf t
crypto-ssl certificate zeroize
ip ssl cert-key-size 2048
ip ssl certificate-data-file tftp 192.168.1.51 certfile
ip ssl private-key-file tftp 192.168.1.51 keyfile
web-management https&lt;/PRE&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Sun, 03 Jul 2022 15:52:53 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ICX-Switches/Can-t-import-SSL-certificates-quot-Could-not-parse-the-PEM/m-p/45445#M3299</guid>
      <dc:creator>DGray</dc:creator>
      <dc:date>2022-07-03T15:52:53Z</dc:date>
    </item>
  </channel>
</rss>

