Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Diameter protocol communication can be protected by using Transport Layer Security, TLS.

TLS Configuration

TLS requires a keystore file that is generated by using the Java standard command keytool. For further information about the keytool command, see the JDK product documentation.

Info
titleExample - TLS Configuration
  1. To Create a keystore:

    Code Block
    languagetext
    themeEclipse
    $ keytool -genkey -keyalg RSA -keystore MZstack.jks

    Keytool prompts for required information such as identity details and password. Note that the keystore password  must  be the same as the key password.


  2. Generate the certificate:

    Code Block
    languagetext
    themeEclipse
    $ keytool -export -keystore MZstack.jks -file ./MZstack.cer

    The certificate file can now be distributed to the other peers.


  3. Install a diameter node certificate in the MZstack keystore:

    Code Block
    languagetext
    themeEclipse
    $ keytool -import -alias "peerTLS" -file peerTLS.cer -keystore MZstack.jks


  4. Enter the keystore path and the keystore password in the Diameter Stack configuration.
      

  5. From the Peer Table, in the Diameter Routing profile configuration select the TCP/TLS protocol for the peer with which you want to establish a secure connection. 

TLS Configuration Properties

You can control the handling of unrecognized certificates by setting the Execution Context property mz.diameter.tls.accept_all.

Info
titleExample - Handling of unrecognized certificates

On a specific EC/ECSA:

Code Block
$ mzsh topo set topo://container:<container>/pico:<pico>/val:config.properties.mz.diameter.tls.accept_all true

On cell level:

Code Block
mzsh topo set topo://cell:default/val:common.config.properties.mz.diameter.tls.accept_all true


...