System_certsView

System > Certificates

To implement the use of certificates for VPN policies, you must locate a source for a valid CA certificate from a third party CA service. Once you have a valid CA certificate, you can import it into the SonicWALL security appliance to validate your Local Certificates. You import the valid CA certificate into the SonicWALL security appliance using the System > Certificates page. Once you import the valid CA certificate, you can use it to validate your local certificates.

This chapter contains the following sections:

 
“Digital Certificates Overview” section
 
“Certificates and Certificate Requests” section
 
“Certificate Details” section
 
“Importing Certificates” section
 
“Deleting a Certificate” section
 
“Generating a Certificate Signing Request” section
 
“Configuring Simple Certificate Enrollment Protocol” section

Digital Certificates Overview

A digital certificate is an electronic means to verify identity by a trusted third party known as a Certificate Authority (CA). The X.509 v3 certificate standard is a specification to be used with cryptographic certificates and allows you to define extensions which you can include with your certificate. SonicWALL has implemented this standard in its third party certificate support.

You can use a certificate signed and verified by a third party CA to use with an IKE (Internet Key Exchange) VPN policy. IKE is an important part of IPsec VPN solutions, and it can use digital certificates to authenticate peer devices before setting up SAs. Without digital certificates, VPN users must authenticate by manually exchanging shared secrets or symmetric keys. Devices or clients using digital signatures do not require configuration changes every time a new device or client is added to the network.

A typical certificate consists of two sections: a data section and a signature section. The data section typically contains information such as the version of X.509 supported by the certificate, a certificate serial number, information about the user’s public key, the Distinguished Name (DN), validation period for the certificate, and optional information such as the target use of the certificate. The signature section includes the cryptographic algorithm used by the issuing CA, and the CA digital signature.

SonicWALL security appliances interoperate with any X.509v3-compliant provider of Certificates. SonicWALL security appliances have been tested with the following vendors of Certificate Authority Certificates:

 
Entrust
 
Microsoft
 
OpenCA
 
OpenSSL
 
VeriSign

Certificates and Certificate Requests

The Certificate and Certificate Requests section provides all the settings for managing CA and Local Certificates.

The View Style menu allows you to display your certificates in the Certificates and Certificate Requests table based on the following criteria:

 
All Certificates - displays all certificates and certificate requests.
 
Imported certificates and requests - displays all imported certificates and generated certificate requests.
 
Built-in certificates - displays all certificates included with the SonicWALL security appliance.
 
Include expired and built-in certificates - displays all expired and built-in certificates.

The Certificates and Certificate Requests table displays the following information about your certificates:

 
Certificate - the name of the certificate.
 
Type - the type of certificate, which can include CA or Local.
 
Validated - the validation information.
 
Expires - the date and time the certificate expires.
 
Details - the details of the certificate. Moving the pointer over the icon displays the details of the certificate.
 
Configure - Displays the edit and delete icons for editing or deleting a certificate entry.
 
Also displays the Import icon to import either certificate revocation lists (for CA certificates) or signed certificates (for Pending requests).

Certificate Details

Clicking on the icon in the Details column of the Certificates and Certificate Requests table lists information about the certificate, which may include the following, depending on the type of certificate:

 
Certificate Issuer
 
Subject Distinguished Name
 
Certificate Serial Number
 
Valid from
 
Expires On
 
Status (for Pending requests and local certificates)
 
CRL Status (for Certificate Authority certificates)

The details shown in the Details mouseover popup depend on the type of certificate. Certificate Issuer , Certificate Serial Number , Valid from , and Expires On are not shown for Pending requests since this information is generated by the Certificate provider. Similarly, CRL Status information is shown only for CA certificates and varies depending on the CA certificate configuration.

Importing Certificates

After your CA service has issued a Certificate for your Pending request, or has otherwise provided a Local Certificate, you can import it for use in VPN or Web Management authentication. CA Certificates may also be imported to verify local Certificates and peer Certificates used in IKE negotiation.

Importing a Certificate Authority Certificate

To import a certificate from a certificate authority, perform these steps:

Step 1
Click Import . The Import Certificate window is displayed.
Step 2
Select Import a CA certificate from a PKCS#7 (*.p7b) or DER (.der or .cer) encoded file . The Import Certificate window settings change.
Step 3
Enter the path to the certificate file in the Please select a file to import field or click Browse to locate the certificate file, and then click Open to set the directory path to the certificate.
Step 4
Click Import to import the certificate into the SonicWALL security appliance. Once it is imported, you can view the certificate entry in the Certificates and Certificate Requests table.
Step 5
Moving your pointer to the icon in the Details column displays the certificate details information.

Importing a Local Certificate

To import a local certificate, perform these steps:

Step 1
Click Import . The Import Certificate window is displayed.
Step 2
Enter a certificate name in the Certificate Name field.
Step 3
Enter the password used by your Certificate Authority to encrypt the PKCS#12 file in the Certificate Management Password field.
Step 4
Enter the path to the certificate file in the Please select a file to import field or click Browse to locate the certificate file, and then click Open to set the directory path to the certificate.
Step 5
Click Import to import the certificate into the SonicWALL security appliance. Once it is imported, you can view the certificate entry in the Certificates and Certificate Requests table.
Step 6
Moving your pointer to icon in the Details column displays the certificate details information.

Deleting a Certificate

To delete the certificate, click the delete icon. You can delete a certificate if it has expired or if you decide not to use third party certificates for VPN authentication.

Generating a Certificate Signing Request

 
Tip
You should create a Certificate Policy to be used in conjunction with local certificates. A Certificate Policy determines the authentication requirements and the authority limits required for the validation of a certificate.

To generate a local certificate, follow these steps:

Step 1
Click the New Signing Request button. The Certificate Signing Request window is displayed.
Step 2
In the Generate Certificate Signing Request section, enter an alias name for the certificate in the Certificate Alias field.
Step 3
Select the Request field type from the menu, then enter information for the certificate in the Request fields. As you enter information in the Request fields, the Distinguished Name (DN) is created in the Subject Distinguished Name field.

You can also attach an optional Subject Alternative Name to the certificate such as the Domain Name or E-mail Address .

Step 4
The Subject Key type is preset as an RSA algorithm. RSA is a public key cryptographic algorithm used for encrypting data.
Step 5
Select a Subject Key size from the Subject Key Size menu.
 
Note
Not all key sizes are supported by a Certificate Authority, therefore you should check with your CA for supported key sizes.
Step 6
Click Generate to create a certificate signing request file. Once the Certificate Signing Request is generated, a message describing the result is displayed.
Step 7
Click Export to download the file to your computer, then click Save to save it to a directory on your computer. You have generated the Certificate Request that you can send to your Certificate Authority for validation.

Configuring Simple Certificate Enrollment Protocol

The Simple Certificate Enrollment Protocol (SCEP) is designed to support the secure issuance of certificates to network devices in a scalable manner. There are two enrollment scenarios for SCEP:

 
SCEP server CA automatically issues certificates
 
SCEP request is set to PENDING and the CA administrator manually issues the certificate.

More information about SCEP can be found at:

 
http://tools.ietf.org/html/draft-nourse-scep-18
 
Microsoft SCEP Implementation Whitepaper

To use SCEP to issue certificates, follow these steps:

Step 1
Generate a signing request as described above in the “Generating a Certificate Signing Request” section .
Step 2
Scroll to the bottom of the System > Certificates page and click on the SCEP button. The SCEP Configuration window displays.
Step 3
In the CSR List pulldown menu, the UI will automatically select a default CSR list. If you have multiple CSR lists configured, you can modify this.
Step 4
In the CA URL field, enter the URL for the Certificate authority.
Step 5
If the Challenge Password field, enter the password for the CA if one is required.
Step 6
In the Polling Interval(S) field, you can modify the default value for duration of time in seconds in between when polling messages are sent.
Step 7
In the Max Polling Time(S) field, you can modify the default value for the duration of time the firewall will wait for a response to a polling message before timing out.
Step 8
Click the Scep button to submit the SCEP enrollment.

The firewall will then contact the CA to request the certificate. The duration of time this will take depends on whether the CA issues certificates automatically or manually. The Log > View page will display messages on the status of the SCEP enrollment and issuance of the certificate. After the certificate is issued, it will be displayed in the list of available certificates on the System > Certificates page, under the Imported certificates and requests category.