# ldapsearch -x -h
config-
ds.example.com -p
389 -D
"cn=directory
manager" -w secret
-b "cn=slapd-
ID,cn=389
Directory
Server,cn=Server
Group,cn=server.ex
ample.com,ou=exam
ple.com ,o=Netscape
Root" -s base
"(objectclass=*)"
nsSecureServerPort
dn: cn=slapd-
ID,cn=389
Directory
Server,cn=Server
Group,cn=server.ex
ample.com,ou=exam
ple.com ,o=Netscape
Root
nsSecureServerPort
: 636
4. Replace the standard SSL
port (636) with the non-
standard one. For
example:
# ldapm odify -x -
h config-
ds.example.com -p
389 -D
"cn=directory
manager" -w secret
dn: cn=slapd-
ID,cn=389
Directory
Server,cn=Server
Group,cn=server.ex
ample.com,ou=exam
ple.com ,o=Netscape
Root
replace:
nsSecureServerPort
nsSecureServerPort
: 1636
5. Make sure the CA
certificate exists in the
Admin Server's certificate
database and has the
Kommentare zu diesen Handbüchern