| Configuring the Security Features |
199
Managing the Trusted Certificates List
When the system serves as a TLS client and requests a TLS connection with a server, the system should verify the
server certificate sent by the server to decide whether it is trusted based on the trusted certificates list.
About this task
The trusted certificates list contains the default and the custom certificates.
•
Default Certificates
: The system has 36 built-in trusted certificates.
•
Custom Certificates
: You can upload up to 10 trusted certificates with the size no more than 5M to the system.
The format of the CA certificates must be .pem, .cer, .crt and .der.
Procedure
1.
On your web user interface, go to
Security
>
Trusted Certs
.
2.
Configure and save the following settings:
Parameter
Description
Configuration Method
Only Accept Trusted
Certificates
Enable or disable the system
only trusting the server
certificates in the trusted
certificates list.
Note
: the default value is
On
.
If it is disabled, the system can
connect to the server no matter
whether the certificate send by
the system is valid or not.
If it is
enabled
, the system
will authenticate the server
certificate based on the trusted
certificates list. Only when the
authentication succeeds, will the
system trust the server.
If you change this parameter, the
system will reboot to make the
change take effect.
Web user interface
Common Name Validation
Enable or disable the system
to mandatorily validate
the CommonName or
SubjectAltName of the server
certificate sent by the server.
This security verification rules
.
Note
: the default value is
Off
.
If you change this parameter, the
system will reboot to make the
change take effect.
Web user interface