McAfee MAP-3300-SWG Product Guide - Page 83

Certificate Management, Import Certificate

Page 83 highlights

Overview of Email features Email Configuration This information is also available by selecting System | Certificate Management | Certificate | TLS certificates and keys on the navigation bar. Table 60 Option definitions Option Certificate ID Subject Issuer Expires Delete View Export Import Certificate and Key Definition Displays the name of the certificate. Displays details about the certificate. Displays the certificate-issuing authority such as Thawte or Verisign. Displays the certificate's expiry date, such as May 05 2010 12:15:00. When clicked, deletes the selected certificate. When clicked, displays details of the selected certificate, such as its version, issuer, and public key. When clicked, opens another window, where you can choose to export the certificate or a complete certificate chain, and specify the certificate format. The file name extension is typically CRT. When clicked, opens another window where you can select a file. The imported certificate can be in one of these formats: • Binary (or DER-encoded) certificate file • PEM (Base64) encoded certificates • Binary PKCS#12 file • PEM-encoded PKCS#12 file To import a password-protected certificate, type the passphrase to unlock the private key. The appliance stores the decrypted certificate in a secure internal location. The appliance verifies the certificate, making it available to use, after you click to apply your changes: If a yellow exclamation point appears next to the certificate after you click the green checkmark to apply the change, the certificate is not currently trusted. Import the associated CA certificate before you use the new certificate. Import Certificate and Key Use this topic to understand the fields found within the Import Certificate and Key dialog box for Transport Layer Security. Email | Email Configuration | Protocol Configuration | Transport Layer Security (SMTP) | Certificate management When requesting that your TLS certificates be created, McAfee recommends that you include the hostname and the IP address for the appliance that will be decrypting the TLS-encrypted email. If your appliance is part of a cluster, and is configured in Transparent Router or Explicit Proxy mode, ensure that the you include the virtual hostname and virtual IP address for your cluster, rather than one of the physical IP addresses. McAfee Email and Web Security Appliances 5.6.0 Product Guide 83

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336

This information is also available by selecting
System
|
Certificate Management
|
Certificate
|
TLS certificates and
keys
on the navigation bar.
Table 60
Option definitions
Option
Definition
Certificate ID
Displays the name of the certificate.
Subject
Displays details about the certificate.
Issuer
Displays the certificate-issuing authority such as Thawte or Verisign.
Expires
Displays the certificate's expiry date, such as May 05 2010 12:15:00.
Delete
When clicked, deletes the selected certificate.
View
When clicked, displays details of the selected certificate, such as its version, issuer,
and public key.
Export
When clicked, opens another window, where you can choose to export the certificate
or a complete certificate chain, and specify the certificate format. The file name
extension is typically CRT.
Import Certificate
and Key
When clicked, opens another window where you can select a file. The imported
certificate can be in one of these formats:
Binary (or DER-encoded) certificate file
PEM (Base64) encoded certificates
Binary PKCS#12 file
PEM-encoded PKCS#12 file
To import a password-protected certificate, type the passphrase to unlock the
private key. The appliance stores the decrypted certificate in a secure internal location.
The appliance verifies the certificate, making it available to use, after you click to
apply your changes:
If a yellow exclamation point appears next to the certificate after you
click the green checkmark to apply the change, the certificate is not
currently trusted. Import the associated CA certificate before you use
the new certificate.
Import Certificate and Key
Use this topic to understand the fields found within the Import Certificate and Key dialog box for
Transport Layer Security.
Email
|
Email Configuration
|
Protocol Configuration
|
Transport Layer Security (SMTP)
|
Certificate management
When requesting that your TLS certificates be created, McAfee
recommends that you include the hostname and the IP address for the
appliance that will be decrypting the TLS-encrypted email. If your
appliance is part of a cluster, and is configured in Transparent Router or
Explicit Proxy mode, ensure that the you include the virtual hostname
and virtual IP address for your cluster, rather than one of the physical IP
addresses.
Overview of Email features
Email Configuration
McAfee Email and Web Security Appliances 5.6.0 Product Guide
83