Solved

Need clarification on F5 Big IP SSL profiles Chain and Trusted CAs

Posted on 2011-03-01
3
1,289 Views
Last Modified: 2012-05-11
Hi Team,

   We have a scenario wherein in our organization our CA is expiring and has now been replaced with a new CA.  This new one, however was sent to us together with an intermediate certificate.

  We have just received the PK12 file of one of the certificates which is up for renewal and which has been signed by the new CA (and the intermediate one).  Both the intermediate and new CA are now installed in our F5 box.

   Our question is, once we renew our new certificate from the GUI, we are not sure how to fill in the blanks for "Chain" and "Trusted Certificate Authorities."  Do we:

A. Leave "Chain" as NONE and  for "Trusted Certificate Authorities"  select the intermediate cert

  OR

B. Leave "Chain" as NONE and for "Trusted Certificate Authorities"  select the new CA

  OR

C. For  "Chain" use the intermediate certificate and for "Trusted Certificate Authorities"  select the new CA?

Thanks and regards.




0
Comment
Question by:rleyba828
  • 2
3 Comments
 

Author Comment

by:rleyba828
ID: 35014597
Also, what open SSL command can I use on the F5 to verify that the new cert works fine with it's various uplink "chains of trust"?

thanks.
0
 
LVL 5

Accepted Solution

by:
torvir earned 500 total points
ID: 35014900
I have done like this on my box.
Certificate: <site certificate>
Key: <key for site cert>
Chain: None
Trusted Certificate Authorities: <intermediate certificate>

Regarding your other quiestion I must say I haven't done that verification myself.
I found a link that may shed some light on it.
http://support.f5.com/kb/en-us/solutions/public/6000/400/sol6401.html?sr=13020249
0
 

Author Comment

by:rleyba828
ID: 35016320
Hi,

Thanks for the explanation and the great link. Everything is much clearer now.
0

Featured Post

Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
I had an issue with InstallShield not being able to use Computer Browser service on Windows Server 2012. Here is the solution I found.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

778 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question