of the two files called
cert-1.cer
and
cert-1.key
to a firewall which has the management IP address
192.168.3.1
:
> scp C:\cert-1.cer [email protected]:certificate/my_cert
> scp C:\cert-1.key [email protected]:certificate/my_cert
The certificate object name in NetDefendOS is
my_cert
for the certificate and this is how it is
referenced by other objects in the configuration.
All certificate uploads should be followed by the configuration being activated since it has been
changed with new objects.
Graphical Interface Uploading
This example covers importing certificate files with the Web Interface.
As mentioned earlier, there can be one or two files to upload depending on the certificate type:
•
Local Certificates
These certificates consist of both a public key
.cer
file and a private key file with the filetype
.key
.
•
Remote Certificates
A
Remote Certificate
is issued by a CA authority and consists of just a single file with a filetype
of
.cer
and this is the public key. The private key is kept on the CA server. The NetDefendOS
upload procedure consists of uploading this one file.
Example 3.44. Uploading a Certificate with the Web Interface
In this example, one or more certificate files stored on the management workstation computer's
disk are to be uploaded.
Web Interface
1.
Go to: Objects > Key Ring > Add > Certificate
2.
Specify a suitable name for the certificate, for example
my_cert
3.
Select the option Upload (this is the default)
4.
Use the Certificate file chooser to select a local public key
.cer
file.
5.
If the certificate is local, use the Private Key file chooser to select the private key certificate
file.
6.
Click OK
Using Uploaded Certificates
Once certificates are uploaded, they are stored in non-volatile NetDefendOS memory. To be used
they must be explicitly associated with a NetDefendOS object. For example, an IPsec tunnel
Chapter 3: Fundamentals
274
Summary of Contents for NetDefendOS
Page 30: ...Figure 1 3 Packet Flow Schematic Part III Chapter 1 NetDefendOS Overview 30 ...
Page 32: ...Chapter 1 NetDefendOS Overview 32 ...
Page 144: ...Chapter 2 Management and Maintenance 144 ...
Page 284: ...Chapter 3 Fundamentals 284 ...
Page 392: ...Chapter 4 Routing 392 ...
Page 419: ... Host 2001 DB8 1 MAC 00 90 12 13 14 15 5 Click OK Chapter 5 DHCP Services 419 ...
Page 420: ...Chapter 5 DHCP Services 420 ...
Page 573: ...Chapter 6 Security Mechanisms 573 ...
Page 607: ...Chapter 7 Address Translation 607 ...
Page 666: ...Chapter 8 User Authentication 666 ...
Page 775: ...Chapter 9 VPN 775 ...
Page 819: ...Chapter 10 Traffic Management 819 ...
Page 842: ...Chapter 11 High Availability 842 ...
Page 866: ...Default Enabled Chapter 13 Advanced Settings 866 ...
Page 879: ...Chapter 13 Advanced Settings 879 ...