Check Connectivity to Device
Verify connectivity to the device on port 3001 using the certificate exported from the keystore.
For example:
bash-4.4#
bash-4.4# curl -v -k https://10.0.0.1:3001/ --cacert cacert.pem
* Trying 10.0.0.1...
* TCP_NODELAY set
* Connected to 10.0.0.1 (10.0.0.1) port 3001 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* successfully set certificate verify locations:
* CAfile: cacert.pem
CApath: none
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.3 (IN), TLS handshake, [no content] (0):
* TLSv1.3 (IN), TLS handshake, Encrypted Extensions (8):
* TLSv1.3 (IN), TLS handshake, [no content] (0):
* TLSv1.3 (IN), TLS handshake, Certificate (11):
* TLSv1.3 (IN), TLS handshake, [no content] (0):
* TLSv1.3 (IN), TLS handshake, CERT verify (15):
* TLSv1.3 (IN), TLS handshake, [no content] (0):
* TLSv1.3 (IN), TLS handshake, Finished (20):
* TLSv1.3 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.3 (OUT), TLS handshake, [no content] (0):
* TLSv1.3 (OUT), TLS handshake, Finished (20):
* SSL connection using TLSv1.3 / TLS_AES_128_GCM_SHA256
* ALPN, server did not agree to a protocol
* Server certificate:
* subject: C=US; ST=Sate; O=ExampleOrg; CN=localCert
* start date: Oct 17 07:40:28 2025 GMT
* expire date: Oct 17 07:40:28 2030 GMT
* issuer: C=US; ST=State; L=City; O=ExampleOrg; CN=localCertCA; emailAddress=certadmin@example.net
* SSL certificate verify ok.
* TLSv1.3 (OUT), TLS app data, [no content] (0):
> GET / HTTP/1.1
> Host: 10.0.0.1:3001
> User-Agent: curl/7.61.1
> Accept: */*
>
* TLSv1.3 (IN), TLS app data, [no content] (0):
< HTTP/1.1 400 Missing CSeq Header
< CSeq: 0 GET
< XML-Schema-Version: SCZ10.0.0/0
* no chunk, no close, no size. Assume close to signal end
<
^C
bash-4.4#
bash-4.4#