Solved

Need clarification on F5 Big IP SSL profiles Chain and Trusted CAs

Posted on 2011-03-01
3
1,267 Views
Last Modified: 2012-05-11
Hi Team,

   We have a scenario wherein in our organization our CA is expiring and has now been replaced with a new CA.  This new one, however was sent to us together with an intermediate certificate.

  We have just received the PK12 file of one of the certificates which is up for renewal and which has been signed by the new CA (and the intermediate one).  Both the intermediate and new CA are now installed in our F5 box.

   Our question is, once we renew our new certificate from the GUI, we are not sure how to fill in the blanks for "Chain" and "Trusted Certificate Authorities."  Do we:

A. Leave "Chain" as NONE and  for "Trusted Certificate Authorities"  select the intermediate cert

  OR

B. Leave "Chain" as NONE and for "Trusted Certificate Authorities"  select the new CA

  OR

C. For  "Chain" use the intermediate certificate and for "Trusted Certificate Authorities"  select the new CA?

Thanks and regards.




0
Comment
Question by:rleyba828
  • 2
3 Comments
 

Author Comment

by:rleyba828
ID: 35014597
Also, what open SSL command can I use on the F5 to verify that the new cert works fine with it's various uplink "chains of trust"?

thanks.
0
 
LVL 5

Accepted Solution

by:
torvir earned 500 total points
ID: 35014900
I have done like this on my box.
Certificate: <site certificate>
Key: <key for site cert>
Chain: None
Trusted Certificate Authorities: <intermediate certificate>

Regarding your other quiestion I must say I haven't done that verification myself.
I found a link that may shed some light on it.
http://support.f5.com/kb/en-us/solutions/public/6000/400/sol6401.html?sr=13020249
0
 

Author Comment

by:rleyba828
ID: 35016320
Hi,

Thanks for the explanation and the great link. Everything is much clearer now.
0

Featured Post

Enabling OSINT in Activity Based Intelligence

Activity based intelligence (ABI) requires access to all available sources of data. Recorded Future allows analysts to observe structured data on the open, deep, and dark web.

Join & Write a Comment

Suggested Solutions

Title # Comments Views Activity
Cisco MRA Phones 4 26
Issue with  IP address/conflict 10 50
High Receive Utilization on my Cisco 3560 V2 10 46
RDP Sonicwall 8 32
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now