McAfee MAP-3300-SWG Product Guide - Page 258

Certificate ID, Subject, Issuer, Expires, Delete, Export, Import Certificate, and Key, Option

Page 258 highlights

Overview of System features Certificate Management Certificates typically have a lifetime of several months or years, so they do not need to be managed often. When requesting that your TLS certificates be created, McAfee recommends that you include the hostname and the IP address for the appliance that will be decrypting the TLS-encrypted email. If your appliance is part of a cluster, and is configured in Transparent Router or Explicit Proxy mode, ensure that you include the virtual hostname and virtual IP address for your cluster, rather than one of the physical IP addresses. Import the trusted Certificates Authorities and certificates from the participating organizations before you begin TLS configuration. RSA keys can be used both for encryption and for signing. DSA keys can be used for signing only. Table 254 Option definitions Option Certificate ID Subject Issuer Expires Delete View Export Import Certificate and Key Definition Displays the name of the certificate. Displays details about the certificate. Displays the certificate-issuing authority such as Thawte or Verisign. Displays the certificate's expiry date, such as May 05 2010 12:15:00. When clicked, deletes the selected certificate. When clicked, displays details of the selected certificate, such as its version, issuer, and public key. When clicked, opens another window, where you can choose to export the certificate or a complete certificate chain, and specify the certificate format. The file name extension is typically CRT. When clicked, opens another window where you can select a file. The imported certificate can be in one of these formats: • Binary (or DER-encoded) certificate file • PEM (Base64) encoded certificates • Binary PKCS#12 file • PEM-encoded PKCS#12 file To import a password-protected certificate, type the passphrase to unlock the private key. The appliance stores the decrypted certificate in a secure internal location. The appliance only verifies the certificate, and makes it available to use, after you click to apply your changes: Description of the icons Icon Description Certificate is valid Certificate is invalid. For example, the certificate has expired. 258 McAfee Email and Web Security Appliances 5.6.0 Product Guide

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

Certificates typically have a lifetime of several months or years, so they do not need to be managed
often.
When requesting that your TLS certificates be created, McAfee
recommends that you include the hostname and the IP address for the
appliance that will be decrypting the TLS-encrypted email. If your
appliance is part of a cluster, and is configured in Transparent Router or
Explicit Proxy mode, ensure that you include the virtual hostname and
virtual IP address for your cluster, rather than one of the physical IP
addresses.
Import the trusted Certificates Authorities and certificates from the
participating organizations before you begin TLS configuration. RSA keys
can be used both for encryption and for signing. DSA keys can be used
for signing only.
Table 254
Option definitions
Option
Definition
Certificate ID
Displays the name of the certificate.
Subject
Displays details about the certificate.
Issuer
Displays the certificate-issuing authority such as Thawte or Verisign.
Expires
Displays the certificate's expiry date, such as May 05 2010 12:15:00.
Delete
When clicked, deletes the selected certificate.
View
When clicked, displays details of the selected certificate, such as its version, issuer,
and public key.
Export
When clicked, opens another window, where you can choose to export the certificate
or a complete certificate chain, and specify the certificate format. The file name
extension is typically CRT.
Import Certificate
and Key
When clicked, opens another window where you can select a file. The imported
certificate can be in one of these formats:
Binary (or DER-encoded) certificate file
PEM (Base64) encoded certificates
Binary PKCS#12 file
PEM-encoded PKCS#12 file
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal location.
The appliance only verifies the certificate, and makes it available to use, after you
click to apply your changes:
Description of the icons
Icon
Description
Certificate is valid
Certificate is invalid. For example, the certificate has expired.
Overview of System features
Certificate Management
258
McAfee Email and Web Security Appliances 5.6.0 Product Guide