Managing local certificates
This section includes the following information:
- Overview
- Generating a Certificate Signing Request (CSR)
- Importing certificates
- Using certificates
- Viewing certificates
Overview
While requesting secure administrator access to a FortiDDoS device via HTTPS, the device uses SSL protocol to ensure that all communication between the device and the HTTP browser is secure no matter which client application is used. Regarding basic authentication made by an HTTP client, the device will use its self-signed security certificate to allow authentication whenever HTTPS is initiated by the client.
Note: The self-signed certificate proposal is the default setting on the device.
The HTTP browser notices the following discrepancies:
- The 'issuer' of the certificate offered by the device is unknown.
- The 'subject' of the certificate doesn't match the FQDN of the HTTP request a.b.c.d.
To avoid the triggering of these messages in the scenario where you don't require your HTTP browser to 'Permanently store this exception':
- Always ensure that the certificate of the CA signed by the device certificate is stored in the browser repository.
- Always ensure that the device is accessed with a correct FQDN.
Once the security exception is confirmed, the login page will be displayed. All the data sent to the device is encrypted and a HTTPS connection is created without reading the self-signed certificate proposal. Once the HTTP browser has permanently stored this exception, the exception prompt is not shown again. If the HTTP client declines the certificate, then the device does not allow the connection.
If you want to avoid these warnings and have a custom certificate, you must assign a host name to the appliance, generate a key pair and certificate request and import the certificate from a signing authority.
NOTE: The factory security certificate is not intended for long term use and as such may have weak security. You MUST secure the system by:
Assigning a host name to the appliance
Generating a key pair and certificate request
Importing the certificate from a valid signing authority.
Generating a Certificate Signing Request (CSR)
FortiDDoS allows you to generate CSRs that you can send to a CA to sign and give you a signed certificate. FortiDDoS creates a key pair that it keeps in a protected storage and is later used for SSL.
Before you begin:
• You must have Read-Write permission for System settings.
To generate a certificate request:
- Go to System > Certificate > Generate and Import.
- Click Generate to display the configuration editor.
- Complete the configuration as described in the table below.
- Save the configuration.
The system creates a private and public key pair. The generated request includes the public key of the FortiDDoS appliance and information such as the IP address, domain name, or email address. The FortiDDoS appliance private key remains confidential in the FortiDDoS appliance. The Status column of the new CSR entry is Pending.
- Select the row that corresponds to the certificate request.
- Click Download.
Standard dialogs appear with buttons to save the file to the location you select. Your web browser downloads the certificate request (.csr) file.
- Upload the certificate request to your CA.
After you submit the request to a CA, the CA will verify the information in the certificate, give it a serial number, an expiration date, and sign it with the public key of the CA.
- If you are not using a commercial CA whose root certificate is already installed by default on web browsers, download your CA’s root certificate, then install it on all computers that will be connecting to your appliance. (If you do not install these, those computers might not trust your new certificate.)
- When you receive the signed certificate from the CA, you can import the certificate into the FortiDDoS system.
Importing certificates
Importing Certificates to an appliance using FortiDDoS-CM is not available. If you need to import a Certificate, login directly to the FortiDDoS appliance GUI. See the instructions under http://help.fortinet.com/fddos/4-7-0/index.htm#cshid=manage_local_certificate.
You can import or upload the following types of server certificates and private keys to the FortiDDoS system:
- local
- PKCS12
- certificate
Before you begin:
- You must have Read-Write permission for System settings.
- You must have downloaded the certificate and key files to browse and upload.
To import a local certificate:
- Go to System > Certificate > Generate and Import.
- Click Import to display the configuration editor.
- Complete the configuration based on the certificate Type selection, as described in the table below.
- Save the configuration.
Importing a local certificate
After the certificate is imported, status shows OK.
Using certificates
- Go to System > Certificate > Web Administration tab.
- Select the desired certificate from the HTTPS Server Certificate (default: Factory) drop-down.
- Save the configuration.
Certificate selection page
Viewing certificates
The system has its own default 'Factory' certificate that it presents to establish secure connections with the administrator client computer.
To view the local certificate:
- Go to System > Certificate > Generate and Import tab.
- Double-click the row corresponding to the Factory Certificate.
Factory Local Certificate