Solved

Need clarification on F5 Big IP SSL profiles Chain and Trusted CAs

Posted on 2011-03-01
3
1,307 Views
Last Modified: 2012-05-11
Hi Team,

   We have a scenario wherein in our organization our CA is expiring and has now been replaced with a new CA.  This new one, however was sent to us together with an intermediate certificate.

  We have just received the PK12 file of one of the certificates which is up for renewal and which has been signed by the new CA (and the intermediate one).  Both the intermediate and new CA are now installed in our F5 box.

   Our question is, once we renew our new certificate from the GUI, we are not sure how to fill in the blanks for "Chain" and "Trusted Certificate Authorities."  Do we:

A. Leave "Chain" as NONE and  for "Trusted Certificate Authorities"  select the intermediate cert

  OR

B. Leave "Chain" as NONE and for "Trusted Certificate Authorities"  select the new CA

  OR

C. For  "Chain" use the intermediate certificate and for "Trusted Certificate Authorities"  select the new CA?

Thanks and regards.




0
Comment
Question by:rleyba828
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 

Author Comment

by:rleyba828
ID: 35014597
Also, what open SSL command can I use on the F5 to verify that the new cert works fine with it's various uplink "chains of trust"?

thanks.
0
 
LVL 5

Accepted Solution

by:
torvir earned 500 total points
ID: 35014900
I have done like this on my box.
Certificate: <site certificate>
Key: <key for site cert>
Chain: None
Trusted Certificate Authorities: <intermediate certificate>

Regarding your other quiestion I must say I haven't done that verification myself.
I found a link that may shed some light on it.
http://support.f5.com/kb/en-us/solutions/public/6000/400/sol6401.html?sr=13020249
0
 

Author Comment

by:rleyba828
ID: 35016320
Hi,

Thanks for the explanation and the great link. Everything is much clearer now.
0

Featured Post

PeopleSoft Has Never Been Easier

PeopleSoft Adoption Made Smooth & Simple!

On-The-Job Training Is made Intuitive & Easy With WalkMe's On-Screen Guidance Tool.  Claim Your Free WalkMe Account Now

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Michael from AdRem Software outlines event notifications and Automatic Corrective Actions in network monitoring. Automatic Corrective Actions are scripts, which can automatically run upon discovery of a certain undesirable condition in your network.…

724 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question