05.08.2013 Views

InterScanTM Messaging Security Virtual Appliance - Online Help ...

InterScanTM Messaging Security Virtual Appliance - Online Help ...

InterScanTM Messaging Security Virtual Appliance - Online Help ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Trend Micro InterScan <strong>Messaging</strong> <strong>Security</strong> <strong>Virtual</strong> <strong>Appliance</strong> Administrator’s Guide<br />

11-18<br />

[root@imsva82b ~]#<br />

After completing this procedure, the /tmp/linux_key.pem file contains the<br />

linux.course.test private key in PEM-format. The /tmp/linux_req.pem file<br />

contains the unsigned certificate (certificate request) in the PEM-format.<br />

Signing the IMSVA Certificate<br />

Signing the certificate is an optional procedure. The certificate must be signed if you do<br />

not want to distribute all the certificates on systems and only distribute the CA<br />

certificate. To confirm that the IMSVA Certificate (/tmp/imsva_req.pem) is trusted<br />

by the CA, you need to sign the IMSVA certificate request by the CA private key<br />

(/tmp/root_key.pem) but before doing this you need to set up the OpenSSL<br />

environment for CA:<br />

1. Update the OpenSSL configuration file /etc/pki/tls/openssl.cnf.<br />

Find the definition of the [ CA_default ]/ dir parameter and change it to<br />

/etc/pki/CA:<br />

[ CA_default ]<br />

dir = /etc/pki/CA # Where everything is kept<br />

2. Create the empty index.txt file in the /etc/pki/CA directory:<br />

[root@imsva82b ~]# touch /etc/pki/CA/index.txt<br />

[root@imsva82b ~]#<br />

3. Create the serial file with initial content in the /etc/pki/CA directory:<br />

[root@imsva82b ~]# echo "01" > /etc/pki/CA/serial<br />

[root@imsva82b ~]#<br />

4. Sign the certificate:<br />

[root@imsva82b ~]# openssl ca -days 365 -cert<br />

/tmp/root_req.pem –keyfile /tmp/root_key.pem -in<br />

/tmp/imsva_req.pem -out /tmp/imsva_cert.pem -outdir /tmp<br />

Using configuration from /etc/pki/tls/openssl.cnf<br />

Enter pass phrase for /tmp/root_key.pem:Trend<br />

Check that the request matches the signature

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!