This article describes the procedure utilized to add (import) an X.509 SSL certificate to the IPS device via the Local Security Manager (LSM).
Note 1: The Intrusion Prevention Systems (IPS) devices utilize a special version of OpenSSL for the IPS certificates and as such they are not replaceable.
Note 2: Depending on your security settings, warnings might display when accessing the LSM client. Loading an X.509 certificate will not affect these warnings.
Note 3: If you are planning on utilizing RADIUS authentication (TOS 3.7.0 or above) and the authentication method will be PEP/EAP-MSCHAPv2, you must first import an X.509 certificate for the RADIUS server.
On the LSM, use theX.509 Certificates page to add X.509 certificates to the IPS. The device supports the following certificates:
- Certificate Authorities (CA) in PEM or DER format
- Certificate Revocation Lists (CRL) in PEM or DER format
- Multiple PEM certificates contained in a single file
The IPS uses the uploaded X.509 certificate to check incoming certificates when the user connects to the LSM.
- If the incoming certificate is not yet valid, has expired, has been revoked, or is otherwise invalid the IPS logs an error in the system log and blocks the connection.
- If the incoming certificate is valid but has an unknown issuer, is self-signed, or includes the wrong purpose, the IPS permits the connection, but logs a warning in the system log.
- If the incoming certificate is valid and has a known issuer, the IPS completes the connection and does not record any errors in the system log.
Import a CA/CRL Certificate:
- Login to the LSM via you web browser
- Go to the Authentication -> X.509 Certificates page.
- In the File to Import field, click Browse and select the certificate you want to install.
- Click Import.
- The certificate is displayed in the Current Certificate Authorities/Device Certificates table.
Reference: LSM User Guide