01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

6<br />

<strong>Web</strong> filtering<br />

SSL scanning<br />

Create your own certificate authority<br />

This section describes a procedure for creating a certificate authority (CA) of your own for use instead<br />

of the certificate authority that is implemented on the appliance after the initial setup.<br />

To create a certificate authority:<br />

1 Go to Policy | Settings.<br />

2 On the Engines branch of the settings tree, go to SSL Client Context with CA and select the<br />

settings you want to configure, for example, Default.<br />

3 Click Generate New. The Generate New Certificate Authority Window opens.<br />

4 In the Organization and Locality fields, type suitable information for your own certificate authority.<br />

5 [Optional] In the Organizational unit and State fields, type suitable information. From the<br />

Country list, select a country.<br />

6 In the Common name field, type a common name for your own certificate authority.<br />

7 [Optional] In the Email address field, type an email address of your organization.<br />

8 From the Valid for list, select the time that your certificate authority should be valid.<br />

9 [Optional] In the Comment field, type a plain-text comment on the certificate authority.<br />

10 Click OK. The new certificate authority is generated.<br />

11 Click Save Changes.<br />

The certificate authority you created through this procedure is the one that signs the certificate the<br />

appliance sends to its clients in the starting phase of the SSL-secured communication.<br />

For information on other settings for the communication between the appliance and its clients, see SSL<br />

Client Context engine settings.<br />

Import a certificate authority<br />

This section describes a procedure for importing an existing certificate authority (CA) for use instead of<br />

the certificate authority that is implemented on the appliance after the initial setup.<br />

To import a certificate authority:<br />

1 Go to Policy | Settings.<br />

2 On the Engines branch of the settings tree, go to SSL Client Context with CA and select the<br />

settings you want to configure, for example, Default.<br />

3 Click Import. The Import Certificate Authority Window opens.<br />

4 In the the Certificate field, enter the name of the file that contains the data for the certificate<br />

authority you want to import. To do this, click the Browse button and browse to a suitable file.<br />

The file must be encoded in PEM (Privacy-enhanced mail) format.<br />

5 In the the Private key field, enter the name of the file that contains the key the certificate authority<br />

uses for signing certificates. To do this, click the Browse button and browse to a suitable file.<br />

The file must be encoded in PEM format. The key must have a length of at least 2048 bit.<br />

6 [Conditional] If the private key is protected by a password, type it in the Password field.<br />

Note: Only unencrypted keys and key that are AES-128-bit encrypted can be used here.<br />

7 [Conditional] If the certificate authority is involved in a certificate chain and you want to retrieve<br />

information on this chain to let the appliance send it to its clients with a certificate, enter the name<br />

of the file that contains the information in the Certificate chain field. To do this, click the Browse<br />

button and browse to a suitable file.<br />

The file must be encoded in PEM format.<br />

226 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!