MTAS XDMS Management Guide
MTAS

Contents

1Introduction
1.1Prerequisites

2

Overview

3

Configuration
3.1Diameter Stack Configuration
3.2Sh Interface Configuration

4

Optional XDMS Function Parameters Configuration

5

Interface Accesses
5.1XDMS Setups
5.2XCAP Handling
5.3Secure CAI3G Interface

6

Logging

1   Introduction

This document describes how to configure the XML Document Management Server (XDMS) function in the MTAS.

1.1   Prerequisites

It is assumed that the user of this document is familiar with the O&M area, in general.

1.1.1   Documents

Before any of the procedures in this document are done, the following documents must be available:

1.1.2   Conditions

The following conditions must apply:

For information on the different users and the corresponding roles, restrictions, and privileges, refer to Certificate Management and User Management.

2   Overview

The XDMS function supports the CAI3G interface to allow the operator to provision and update the PSTN/ISDN Simulation Services data for subscribers and an Ut interface to allow the subscriber to manipulate their own PSTN/ISDN Simulation Services data. To achieve this, the XDMS function also supports a Sh interface to fetch and update the data in the Home Subscriber Server (HSS). All service data XML instance files have normalized entries, refer to Managed Object Model (MOM).

The configuration of the XDMS function involves defining Diameter stack attributes, and defining the realm to which the HSS node belongs. Optionally, the configuration involves defining the hostname of the HSS node or the Subscriber Location Function (SLF) node.

The MtasXdms Managed Object (MO) controls the XDMS function for a complete MTAS node.

The configuration of the Diameter stack and the Sh interface of the XDMS function is shared with the subscriber data function.

The configuration of the Number Normalization data of the XDMS function is shared with the subscriber data function, for more information, refer to Managed Object Model (MOM).

3   Configuration

3.1   Diameter Stack Configuration

Several of the MTAS-specific parameter values must be configured in the Diameter stack. To configure the Diameter stack instance for the XDMS function, refer to MTAS Subscriber Data Management Guide.

3.2   Sh Interface Configuration

To route Sh messages correctly, it is necessary to specify which realm the HSS nodes belong to. The Sh configuration attributes of the XDMS function are shared with the subscriber data function.

To configure the Sh parameters, configure the applicable attributes, mtasShIfDestinationRealm, and mtasShIfDestinationHost. For more information, refer to MTAS Subscriber Data Management Guide.

The mtasShIfMmtelServiceInd is set by default during the MTAS installation.

4   Optional XDMS Function Parameters Configuration

The MtasXdmsData MO makes it possible to configure other parameters, than the ones that are described in this document, and which are related to the XDMS function. For a complete description of all parameters relating to the configuration of the XDMS function MO, refer to Managed Object Model (MOM).

If a parameter is changed, it is a delay of 5 seconds until the new value is reflected.

5   Interface Accesses

The XDMS function supports CAI3G and Ut interfaces, which includes the protocol XML Configuration Access Protocol (XCAP).

CAI3G

The XDMS function supports a CAI3G interface to allow the operator to manage subscriber data. The CAI3G interface is a Web Services interface.

To enable the CAI3G interface, it must be unlocked using the mtasXdmsCai3gAdministrativeState parameter on the MtasXdms MO.

It is also necessary to create at least one user account – an instance of MtasXdmsCai3gUser MO with its associated mtasXdmsCai3gUserPassword parameter.

When a CAI3G operation is received, XDMS uses the IMPU inside the CAI3G message to do the provisioning. This is the default behavior and in normal cases, the received IMPU inside the CAI3G message is the default IMPU. If the wanted behavior is to check in the IRS to get the default IMPU (first entry in the IRS), the parameter mtasXdmsCai3gIrsDefaultImpuUsage must be set. Do not change this parameter after users have been provisioned.

For further details, refer to Managed Object Model (MOM).

Note:  
If Service Profile is used, the MMTel AS Voice Base license must be installed.

Ut, protocol

XCAP

To enable the Ut interface, it must be unlocked using the mtasXdmsUtAdministrativeState parameter on the MtasXdms MO.

To enable the selective validation on Ut interface, the mtasXdmsUtValidation parameter must be set on the MtasXdms MO. MMTel AS validates the received XCAP request together with the user document but for CDIV service the validation constraints are applied only on the received request. When CDIV service is not part of the XCAP request, then the validation of CDIV service in the user document is skipped.

For further details, refer to Managed Object Model (MOM).

To use the Ut interface, the MMTel AS Voice Base license must be installed.

Note:  
If Service Profile is used, the MMTel AS Voice Base license must be installed.

The XCAP protocol for MMTel Telephony AS allows the subscriber to manipulate their PSTN/ISDN Simulation Services data. For more information, refer to RFC 4825.

5.1   XDMS Setups

The XCAP Root URI does not correspond to an actual resource on an XCAP server. Actual resources are created by appending additional path information to the XCAP Root URI. For more information on XCAP Root, refer to RFC 4825.

The URI for the XCAP Root (interface) on the MMTel AS is as follows:

http://<platform-vip>:8090/mtasxdms

The URI for the CAI3G interface on the MMTel AS is as follows:

HTTP

http://<cai3g-vip4>:8095/axis2/services/CAI3G

HTTPS

https://<cai3g-vip4>:8443/axis2/services/CAI3G

The URI for the CAI3G interface on the ST AS is as follows:

HTTP

http://<cai3g-vip4>:8095/mtasstas

HTTPS

https://<cai3g-vip4>:8443/mtasstas

Note:  
If IPv6 is used, <ut-vip6> and <cai3g-vip6> must be used. That is, a numeric IPv6 address, the address must be enclosed in brackets (for example: [2000::4:66]).

5.2   XCAP Handling

The PSTN/ISDN Simulation Services application use has an AUID of simservs.ngn.etsi.org. The document name for configuration of an individual subscriber is simservs.xml. This means that the URL to access a document for a particular user has the following form:

http://<ut-vip4>:8090/mtasxdms/simservs.ngn.etsi.org/users/<subscriber_uri>/simservs.xml

The parameter <node_selector> equals the selected extra node selector.

The XDMS function also supports the XCAP server capabilities application use with AUID "‘xcap-caps"’. The URL to access the XCAP server capabilities has the following form:

http://<ut-vip4>:8090/mtasxdms/xcap-caps/global/index

Note:  
If IPv6 is used, <ut-vip6> must be used. That is, a numeric IPv6 address, the address must be enclosed in brackets (for example: [2000::4:66]).

5.3   Secure CAI3G Interface

The XDMS function supports to secure the operator CAI3G interface (HTTPS).

The default setting in xdms.properties is as follows:

[mySsl]
ciphers: HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!RC4:!MD5:kRSA:!DHE
clientAuth: false
keyPass: xdmspass
keystoreFile: /opt/mtas/xdms/config/.xdmskeystore
sslEnabledProtocols: TLSv1.1,TLSv1.2
sslProtocol: TLS
Note:  
The set values are valid both for IPv4 and IPv6 and must be set in the xdms.properties.

The following handlings are described:

5.3.1   Update SSL Protocols

The default value is sslEnabledProtocols: TLSv1.1, TLSv1.2.

The SSL protocols indicate which protocol can be used for communicating with clients. Acceptable values are SSLv2, SSLv3, TLSv1, TLSv1.1, TLSv1.2, and any combination of these protocols is comma-separated.

Both SSLv2 and SSLv3 protocols are inherently unsafe and the BEAST problem exist in TLSv1.

If another value is required for the SSL protocol, the value must be changed.

To set SSL protocols:

  1. Log on to controller as maintenance user using Secure Shell (SSH):

    ssh <username>@<OAM VIP>

  2. Change to directory:

    cd /cluster/storage/system/config/mtas/

  3. Verify that the xdms.properties file exists:

    ls xdms.properties

    If the file does not exist, perform the procedure in Section 5.3.5 Add Default XDMS Properties.

  4. Update the xdms.properties file and save it.

    Example if only SSL protocol TLSv1.2 is allowed:

    sslEnabledProtocols: TLSv1.2

  5. For the changes to take effect, Tomcat must be restarted on all payloads, see Section 5.3.11 Apply Modification.

5.3.2   Update keyPass and keystorePass

The default value is:

keyPass = "xdmspass"

If another keyPass is needed, the value must be changed.

To set the keyPass and keystorePass:

  1. Log on to controller as maintenance user using Secure Shell (SSH):

    ssh <username>@<OAM VIP>

  2. Change to directory:

    cd /cluster/storage/system/config/mtas/

  3. Verify that the xdms.properties file exists:

    ls xdms.properties

    If the file does not exist, perform the procedure in Section 5.3.5 Add Default XDMS Properties.

  4. Update xdms.properties file and save it.

    For example, if keyPass is updated to "newpass":

    keyPass: "newpass"

    If keystorePass is updated to "newpass":

    keystorePass: "newpass"

  5. For the changes to take effect, Tomcat must be restarted on all payloads, see Section 5.3.11 Apply Modification.

5.3.3   Update Ciphers

The default value is:

ciphers: HIGH:!aNULL:!eNULL:!EXPORT:!DES:!3DES:!RC4:!MD5:kRSA:!DHE

Note:  
It is not recommended to use 3DES cipher because of SWEET32 problem.

Java treats the order in which ciphers are defined as an order of preferences.

If another value is needed for ciphers, the value must be changed.

To set ciphers:

  1. Log on to controller as maintenance user using Secure Shell (SSH):

    ssh <username>@<OAM VIP>

  2. Change to directory:

    cd /cluster/storage/system/config/mtas/

  3. Verify that the xdms.properties file exists:

    ls xdms.properties

    If the file does not exist, perform the procedure in Section 5.3.5 Add Default XDMS Properties.

  4. Update the xdms.properties file and save it.

    Example if only ciphers AES256-GCM-SHA384 is allowed:

    ciphers: AES256-GCM-SHA384

  5. For the changes to take effect, Tomcat must be restarted on all payloads, see Section 5.3.11 Apply Modification.

5.3.4   Update Other Parameters

The following parameters have default values set according to Apache Tomcat documentation refer to http://tomcat.apache.org/tomcat-8.5-doc/, but can be modified:

If any of these parameters need another value, it must be added in xdms.properties file. An example follows, but it is the same procedure for the other parameters.

To add "algorithm":

  1. Log on to controller as maintenance user using Secure Shell (SSH):

    ssh <username>@<OAM VIP>

  2. Change to directory:

    cd /cluster/storage/system/config/mtas/

  3. Verify that the xdms.properties file exists:

    ls xdms.properties

    If the file does not exist, perform the procedure in Section 5.3.5 Add Default XDMS Properties.

  4. Update the xdms.properties file and save it.

    Example: To set algorithm with value "new value".

  5. For the changes to take effect, Tomcat must be restarted on all payloads, see Section 5.3.11 Apply Modification.

5.3.5   Add Default XDMS Properties

To add default XDMS properties:

  1. Copy the file /opt/mtas/xdms/config/xdms.properties if not existing from one on each Payload Node, where x is the number of the corresponding Payload Node.

    scp <PL-x>:/opt/mtas/xdms/config/xdms.properties \
    /cluster/storage/system/config/mtas/

    Example from PL-3:

    scp <PL-3>:/opt/mtas/xdms/config/xdms.properties \
    /cluster/storage/system/config/mtas/

  2. Change the mod:

    chmod 644 \
    /cluster/storage/system/config/mtas/xdms.properties

5.3.6   Client Certificate Authentication

The default value for client certificate authentication is:

clientAuth: false

When the value is false, the client is not required to submit a certificate. If the server wants to authenticate the client’s certificate, the value must be set to true.

To enable client certificate authentication:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Change to directory:

    cd /cluster/storage/system/config/mtas/

  3. Verify that the xdms.properties file exists:

    ls xdms.properties

    If the file does not exist, perform the procedure in Section 5.3.5 Add Default XDMS Properties.

  4. Update the xdms.properties file to enable client certificate authentication:

    clientAuth: true

  5. For the changes to take effect, restart Tomcat on all payloads, see Section 5.3.11 Apply Modification.

5.3.7   Handling of Certificates

The XDMS function supports a secured CAI3G interface to manage subscriber data in an encrypted and authenticated way. The authentication of the MTAS is enabled by a trusted certificate.

Two different methods of handling certificates are supported:

5.3.8   Handling of Self-Signed Certificate

The following actions are supported:

5.3.8.1   Initial Installation of Certificate

This action requires the following steps:

  1. Generate Self-Signed Certificate, see Section 5.3.10.3 Generate Self-Signed Certificate.
  2. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  3. Validate Self-Signed Certificate, see Section 5.3.10.5 Validate Self-Signed Certificate.
  4. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.8.2   Renew Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Validate Self-Signed Certificate, see Section 5.3.10.5 Validate Self-Signed Certificate.
  3. Renew Self-Signed Certificate, see Section 5.3.10.4 Renew Self-Signed Certificate.
  4. Import Self-Signed Certificate, see Section 5.3.10.6 Import Self-Signed Certificate.
  5. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  6. Validate Self-Signed Certificate, see Section 5.3.10.5 Validate Self-Signed Certificate.
  7. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.8.3   Validate Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Validate Self-Signed Certificate, see Section 5.3.10.5 Validate Self-Signed Certificate.

5.3.8.4   List Certificate

This action requires the following step:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.

5.3.8.5   Remove Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Remove Certificate, see Section 5.3.10.12 Remove Certificate.
  3. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.8.6   Import Certificate from MTAS TSP Node

This action requires the following steps:

  1. Migrate Certificate from TSP, see Section 5.3.10.10 Migrate Certificate from TSP.
  2. Remove Certificate, see Section 5.3.10.12 Remove Certificate.
  3. Install Migrated CAI3G Certificate, see Section 5.3.10.11 Install Migrated CAI3G Certificate.
  4. Import Self-Signed Certificate, see Section 5.3.10.6 Import Self-Signed Certificate.
  5. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  6. Validate Self-Signed Certificate, see Section 5.3.10.5 Validate Self-Signed Certificate.
  7. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.9   Handling of CA Signed Certificate

The following actions are supported:

5.3.9.1   Initial Installation of Certificate

This action requires the following steps:

  1. Generate Private Key, see Section 5.3.10.2 Generate Private Key.
  2. Generate Certificate Signing Request, see Section 5.3.10.7 Generate Certificate Signing Request.
  3. Import CA Signed Certificate, see Section 5.3.10.9 Import CA Signed Certificate.
  4. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  5. Validate CA Signed Certificate, see Section 5.3.10.8 Validate CA Signed Certificate.
  6. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.9.2   Renew Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Generate Certificate Signing Request, see Section 5.3.10.7 Generate Certificate Signing Request.
  3. Import CA Signed Certificate, see Section 5.3.10.9 Import CA Signed Certificate.
  4. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  5. Validate CA Signed Certificate, see Section 5.3.10.8 Validate CA Signed Certificate.
  6. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.9.3   Validate Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Validate CA Signed Certificate, see Section 5.3.10.8 Validate CA Signed Certificate.

5.3.9.4   List Certificate

This action requires the following step:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.

5.3.9.5   Remove Certificate

This action requires the following steps:

  1. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  2. Remove Certificate, see Section 5.3.10.12 Remove Certificate.
  3. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.9.6   Import Certificate from MTAS TSP Node

This action requires the following steps:

  1. Migrate Certificate from TSP, see Section 5.3.10.10 Migrate Certificate from TSP.
  2. Remove Certificate, see Section 5.3.10.12 Remove Certificate.
  3. Install Migrated CAI3G Certificate, see Section 5.3.10.11 Install Migrated CAI3G Certificate.
  4. Import CA Signed Certificate, see Section 5.3.10.9 Import CA Signed Certificate.
  5. List Stored Certificates, see Section 5.3.10.1 List Stored Certificates.
  6. Validate CA Signed Certificate, see Section 5.3.10.8 Validate CA Signed Certificate.
  7. Restart Tomcat, see Section 5.3.11 Apply Modification.

5.3.10   Handling Certificate Operations

The following operations are supported:

5.3.10.1   List Stored Certificates

To list the stored certificates:

  1. Log on to controller as maintenance user, using Secure Shell (SSH):

    ssh <username>@<OAM VIP>

  2. List the stored certificates:

    sudo /usr/java/latest/bin/keytool -list -v -storepass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore

5.3.10.2   Generate Private Key

To generate a private key:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Generate private key in keystore:

    sudo /usr/java/latest/bin/keytool -genkey -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore

5.3.10.3   Generate Self-Signed Certificate

To generate a self-signed certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Generate a self-signed certificate:

    sudo /usr/java/latest/bin/keytool -genkey -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore

  3. Enter the certificate data.

5.3.10.4   Renew Self-Signed Certificate

To renew the self-signed certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Export the keystore into PKCS12 format:

    sudo /usr/java/latest/bin/keytool -importkeystore -srckeystore /cluster/storage/system/config/mtas/.xdmskeystore -destkeystore xdms.p12 -deststoretype PKCS12 -srcalias CAI3G -deststorepass xdmspass

  3. Export the private key from the exported keystore:

    sudo openssl pkcs12 -in xdms.p12 -nodes -nocerts -out xdms.pem

  4. Generate the self-signed certificate:

    sudo openssl req -x509 -new -nodes -days 3650 -key xdms.pem -out /cluster/storage/system/config/mtas/xdms.crt

5.3.10.5   Validate Self-Signed Certificate

To validate the self-signed certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Export the self-signed certificate:

    sudo /usr/java/latest/bin/keytool -export -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore -file /cluster/storage/system/config/mtas/xdms.crt

  3. Validate the certificate:

    sudo /usr/java/latest/bin/keytool -printcert -v -file /cluster/storage/system/config/mtas/xdms.crt

    The following information is extracted from the file, for example:

    Valid from: Sat Oct 31 13:18:28 PDT 2016 until: Sat Oct 31 13:18:28 CET 2026

    Check the date to ensure that the certificate is valid.

5.3.10.6   Import Self-Signed Certificate

To import a trusted certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Import the self-signed certificate:

    sudo /usr/java/latest/bin/keytool -import -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore –file xdms.crt

  3. Examine the certificate data, enter yes if trusted.

5.3.10.7   Generate Certificate Signing Request

To generate a Certificate Signing Request (CSR):

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Generate CSR:

    sudo /usr/java/latest/bin/keytool -storepass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore -certreq -alias CAI3G

  3. Send the CSR CAI3G.csr to certificate authority.
  4. A certificate chain is received from the CA, for example: root certificate <root.crt>, intermediate certificate <intermediate1.crt>, <intermediate2.crt>, and so on, which are signed by root, and user certificate <user.crt> which is signed by intermediate.

    It is possible to combine all certificates together to a combined XDMS certificate, for example:

    cat <root.crt> > xdms.crt
    cat <intermediate1.crt> >> xdms.crt
    cat <intermediate2.crt> >> xdms.crt
    ...
    cat <user.crt> >> xdms.crt

    Copy the combined certificate xdms.crt to the folder:

    /cluster/storage/system/config/mtas

5.3.10.8   Validate CA Signed Certificate

To validate the CA signed certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Validate all the CA signed certificates in the authentication chain:

    sudo /usr/java/latest/bin/keytool -printcert -v -file /cluster/storage/system/config/mtas/xdms.crt

    The following information is extracted from the file, for example:

    Valid from: Sat Oct 31 13:18:28 PDT 2016 until: Sat Oct 31 13:18:28 CET 2026

    Check the date to ensure that the certificate is valid.

5.3.10.9   Import CA Signed Certificate

To import a CA signed certificate:

  1. Copy the trusted certificate to the cluster:

    sftp <username>@<OAM VIP>

    lcd <local path of the certificate file>

    cd /cluster/storage/system/config/mtas

    put xdms.crt

    exit

  2. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  3. Import the trusted CAI3G certificate:

    sudo /usr/java/latest/bin/keytool -import -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore –file /cluster/storage/system/config/mtas/xdms.crt

  4. Examine the certificate data, enter yes if trusted.

5.3.10.10   Migrate Certificate from TSP

To migrate certificate from TSP, on the TSP node:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Create a migration folder on the TSP IO blade:

    mkdir /opt/telorb/axe/tsp/xdmsConfig/ssl_migration

  3. Convert x509 Cert and Key to a pkcs12 file:

    sudo openssl pkcs12 -export -in /opt/telorb/axe/tsp/xdmsConfig/xdms.crt -inkey /opt/telorb/axe/tsp/xdmsConfig/xdms.key -out /opt/telorb/axe/tsp/xdmsConfig/ssl_migration/xdms.p12 -name CAI3G -CAfile /opt/telorb/axe/tsp/xdmsConfig/ssl_migration/ca.crt -caname root

  4. Convert the pkcs12 file to a java keystore:

    keytool -importkeystore -destkeystore /opt/telorb/axe/tsp/xdmsConfig/ssl_migration/.xdmskeystore -srckeystore /opt/telorb/axe/tsp/xdmsConfig/ssl_migration/xdms.p12 -srcstoretype PKCS12 -alias CAI3G

  5. Convert x509 Cert to x509 Cert DER:

    openssl x509 -in /opt/telorb/axe/tsp/xdmsConfig/xdms.crt -outform der -out /opt/telorb/axe/tsp/xdmsConfig/ssl_migration/xdms.crt

  6. Tar all files in the folder /opt/telorb/axe/tsp/xdmsConfig/ssl_migration into one .tar file:

    tar -cvf xdms_migration.tar /opt/telorb/axe/tsp/xdmsConfig/ssl_migration

  7. Copy the file to outside of node or directly to the new vMTAS node using command scp.

5.3.10.11   Install Migrated CAI3G Certificate

To install the migrated CAI3G certificate:

  1. Copy the exported tar file xdms_migration.tar from the folder on the MTAS node:

    /opt/telorb/axe/tsp/xdmsConfig/ssl_migration

    Copy the .tar file to the vMTAS node folder:

    /cluster/storage/system/config/mtas

  2. Extract the migrated files from xdms_migration.tar to the folder:

    /cluster/storage/system/config/mtas/xdms_migration

    Copy the extracted files to folder /cluster/storage/system/config/mtas as follows:

    /cluster/storage/system/config/mtas/.xdmskeystore
    /cluster/storage/system/config/mtas/xdms.crt
    /cluster/storage/system/config/mtas/ca.crt

5.3.10.12   Remove Certificate

To delete the CAI3G certificate:

  1. Log on to controller as maintenance user, using SSH:

    ssh <username>@<OAM VIP>

  2. Before removing the certificate, export it to a backup file:

    sudo /usr/java/latest/bin/keytool -export -alias CAI3G -storepass xdmspass -keypass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore -file /cluster/storage/system/config/mtas/xdms.crt_<date>.orig

  3. Delete the old CAI3G certificate:

    sudo /usr/java/latest/bin/keytool -delete -alias CAI3G -keypass xdmspass -storepass xdmspass -keystore /cluster/storage/system/config/mtas/.xdmskeystore

    Note:  
    Before restart, running Tomcat still uses the original certificate. Normally, the new certificate is imported into keystore before a restart. For a restart without certificate installed in keystore, XDMS copies the default certificate and applies it to secure the operator CAI3G interface.

5.3.11   Apply Modification

To restart the MMAS traffic instances:

  1. Check the DN of the MMAS instances:

    immfind safSg=NWA,safApp=ERIC-mmas.tomcat.traffic | grep ^safComp

    The following is an example output:

    safComp=ERIC-MMAS-COMP-0,safSu=ERIC-MMAS-SU-0,safSg=NWA,safApp=ERIC-mmas.tomcat.traffic
    
    safComp=ERIC-MMAS-COMP-0,safSu=ERIC-MMAS-SU-1,safSg=NWA,safApp=ERIC-mmas.tomcat.traffic 
  2. Restart the instances one by one on each Payload Node, where x is the number of the corresponding Payload Node, and DN is the identity of the MMAS instance, as queried in Step 1.

    ssh <emergency user>@<PL-x>
    sudo amf-adm restart <DN>

    The following is an example output:

    ssh mtasuser01@PL-3
    sudo amf-adm restart safComp=ERIC-MMAS-COMP-0,safSu
    =ERIC-MMAS-SU-0,safSg=SG-traffic,safApp=ERIC-mmas.tomcat.traffic
  3. Restart the MTAS software. For further details, refer to MTAS VNF Management Guide.

6   Logging

The XDMS logging is described in MTAS Logs. For information about how to collect the logs, refer to Data Collection Guideline for MTAS.