Netgear SRX5308 SRX5308 Reference Manual - Page 246

Understanding the Certificates Screen, Certificates, Trusted Certificates CA Certificate table - replacement

Page 246 highlights

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual You can obtain a digital certificate from a well-known commercial certificate authority (CA) such as Verisign or Thawte, or you can generate and sign your own digital certificate. Because a commercial CA takes steps to verify the identity of an applicant, a digital certificate from a commercial CA provides a strong assurance of the server's identity. A self-signed digital certificate triggers a warning from most browsers because it provides no protection against identity theft of the server. The VPN firewall contains a self-signed digital certificate from NETGEAR. This certificate can be downloaded from the VPN firewall login screen for browser import. However, NETGEAR recommends that you replace this digital certificate with a digital certificate from a well-known commercial CA prior to deploying the VPN firewall in your network. Understanding the Certificates Screen To display the Certificates screen, select VPN > Certificates from the menu. Because of the large size of this screen, and because of the way the information is presented, the Certificates screen is divided and presented in this manual in three figures (Figure 7-11 on page 7-19, Figure 7-13 on page 7-21, and Figure 7-15 on page 7-25). The Certificates screen lets you to view the currently loaded digital certificates, upload a new digital certificate, and generate a Certificate Signing Request (CSR). The VPN firewall typically holds two types of digital certificates: • CA digital certificates. Each CA issues its own CA identity digital certificate to validate communication with the CA and to verify the validity of digital certificates that are signed by the CA. • Self digital certificates. The digital certificates that are issued to you by a CA to identify your device. The Certificates screen contains four tables that are explained in detail in the following sections: • Trusted Certificates (CA Certificate) table. Contains the trusted digital certificates that were issued by CAs and that you uploaded (see "Managing Self Certificates" on page 7-20). • Active Self Certificates table. Contains the digital self certificates that were issued by CAs and that you uploaded (see "Managing Self Certificates" on page 7-20). • Self Certificate Requests table. Contains the self certificate requests that you generated. These requests might or might not have been submitted to CAs, and CAs might or might not have issued digital certificates for these requests. Only the digital self certificates in the Active Self Certificates table are active on the VPN firewall (see "Managing Self Certificates" on page 7-20). 7-18 Managing Users, Authentication, and Certificates v1.0, April 2010

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384

ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual
7-18
Managing Users, Authentication, and Certificates
v1.0, April 2010
You can obtain a digital certificate from a well-known commercial certificate authority (CA) such
as Verisign or Thawte, or you can generate and sign your own digital certificate. Because a
commercial CA takes steps to verify the identity of an applicant, a digital certificate from a
commercial CA provides a strong assurance of the server’s identity. A self-signed digital
certificate triggers a warning from most browsers because it provides no protection against identity
theft of the server.
The VPN firewall contains a self-signed digital certificate from NETGEAR. This certificate can be
downloaded from the VPN firewall login screen for browser import. However, NETGEAR
recommends that you replace this digital certificate with a digital certificate from a well-known
commercial CA prior to deploying the VPN firewall in your network.
Understanding the Certificates Screen
To display the Certificates screen, select
VPN
>
Certificates
from the menu. Because of the large
size of this screen, and because of the way the information is presented, the Certificates screen is
divided and presented in this manual in three figures (
Figure 7-11 on page 7-19
,
Figure 7-13 on
page 7-21
, and
Figure 7-15 on page 7-25
).
The Certificates screen lets you to view the currently loaded digital certificates, upload a new
digital certificate, and generate a Certificate Signing Request (CSR). The VPN firewall typically
holds two types of digital certificates:
CA digital certificates. Each CA issues its own CA identity digital certificate to validate
communication with the CA and to verify the validity of digital certificates that are signed by
the CA.
Self digital certificates. The digital certificates that are issued to you by a CA to identify your
device.
The Certificates screen contains four tables that are explained in detail in the following sections:
Trusted Certificates (CA Certificate) table
. Contains the trusted digital certificates that were
issued by CAs and that you uploaded (see
“Managing Self Certificates” on page 7-20
).
Active Self Certificates table
. Contains the digital self certificates that were issued by CAs
and that you uploaded (see
“Managing Self Certificates” on page 7-20
).
Self Certificate Requests table
. Contains the self certificate requests that you generated.
These requests might or might not have been submitted to CAs, and CAs might or might not
have issued digital certificates for these requests. Only the digital self certificates in the Active
Self Certificates table are active on the VPN firewall (see
“Managing Self Certificates” on
page 7-20
).