NSP TLS configuration requirements

TLS deployment options

During NSP system deployment, you can choose to use one or more TLS certificates that the NSP generates and signs, or can provide one or more of your own signed certificates, which are called custom certificates.

Note: The required NSP server certificates vary, depending on the NSP deployment options. For example, if mTLS is enabled for MDM and gNMI telemetry in the NSP cluster configuration file, you are prompted to provide the mTLS artifacts during NSP secret installation.

Note: If the NSP clusters use advertised hostnames, the SAN field of an NSP server certificate must include the advertised hostname of each NSP cluster.

Note: The private key and certificate files for an NSP deployment must be in unencrypted PEM format.

Using custom TLS certificates

A custom TLS certificate for the NSP must:

Note: A custom NSP server certificate must be unique to an NSP cluster, and must include the NSP cluster address in the SAN field.

See To generate custom NSP TLS artifacts for configuration information.

NFM-P TLS requirements

If your NSP deployment includes the NFM-P and you use self-signed certificates, you must do one of the following:

If the NFM-P main servers use hostnames for communication with other components:

Note: A short hostname is valid only if DNS can resolve the hostname.

Using intermediate signing certificates

The NSP PKI service can act as an intermediate CA. The supported intermediate key type is a 4096-bit RSA key.

The required and recommended key extensions are the following:

For example:

Note: Required restrictions are in boldface type:

X509v3 Basic Constraints: critical

CA:TRUE, pathlen:0

X509v3 Key Usage: critical

Digital Signature, Certificate Sign, CRL Sign

TLS version and cipher support

By default, only TLS 1.2 is enabled. However, external systems such as OSS clients may use deprecated TLS versions. For NSP compatibility with such systems, you can enable older TLS versions.

Note: You must enable support for the deprecated TLS versions in an NSP deployment that includes a Release 20 WS-NOC.

The following parameter in the NSP configuration file enables or disables the support for the deprecated TLS versions:

NFM-P TLS version and cipher support

The NFM-P includes a tool for managing the supported TLS versions and ciphers. A TLS version or cipher may be required for compatibility with an older OSS, or may be considered unsecure and need to be disabled if a security vulnerability is identified. You can configure the NFM-P to enable or disable the support for specific versions and ciphers, as required.