Configuring public certificates in NetWall firewallsLast modified on 5 Apr, 2022. Revision 35
|Up to date for||
In some situations it can get complex when using self-signed certificates, for example when using them for VPN connections like IPSEC IKEv2 or SSLVPN via OneConnect.
The reason is that you need to deploy your whole certificate chain on all devices you wish to connect from. Otherwise you will get security warnings and/or connection warnings.
Buying a certificate from a Trusted Root Certification Authority can simplify your life a lot, as most modern clients (like Windows, Linux, Mac) and browsers trust them already. As a result VPN deployments are much simpler.
Please be aware that you need a DNS name pointing to your NetWall’s public IP address. In case you only have a dynamic IP you can use a DynDNS provider of your choice to make this solution work.
XCA for certificate management
For comfortable management per GUI we will use XCA in this HowTo. XCA is a free certificate and key management software made by Christian Hohnstädt ( firstname.lastname@example.org ) and can be found on the following webpage:
When XCA is installed, start the program and create a new Database. In this database you can manage all your certificates. Please make sure you use a strong password and keep a backup in a safe place to avoid data loss!
Generating the certificate signing request (CSR)
Create a certificate signing request for your NetWall system.
On the source tab enter name and challenge password for the CSR. Select ‘TLS_server’ as template and press Apply extensions.
(Note: The challenge password was typically used for identification purpose in case you need to revoke your certificate. Depending on your provider it could be obsolete. Only use alphanumeric characters here.)
On the subject tab fill in the necessary fields. The commonName is the DNS name. Using a valid emailAddress is recommended as resellers commonly use this for validation.
When finished click on Generate a new key. This will generate the private key for your certificate.
You should get a confirmation that the key was successfully generated.
NOTE: The key file with your private key is NOT part of the CSR. The private key stays on your computer! You will need it later when importing the certificate in the firewall.
On the extensions tab it is necessary that you select End Entity as type. It’s also mandatory that the field X509v3 Subject Alternative Name contains the DNS name of your domain as shown.
(Note: If the field is pre-set with ‘DNS:copycn’, this function will fill in the commonName you did set in the subject tab)
Export the CSR in .PEM format.
Request your certificate (CER)
You will find plenty of resellers for certificates. Some thoughts which might help you: There are some ‘well-known’ names on the market which offer certificates for an afforable price (less then 20,- EUR/year). Please make sure that your selections Certificate Authority (CA) is listed in the trusted certificate stores of your client operating systems and/or apps. (note: Firefox for example uses it’s own internal certificate storage).
In this HowTo we use a ‘Domain Validation SSL certificate’ from Sectigo, as it’s cheap and we do not need (the more expensive) Organiation or Extended Validation certificates. Note: Clavister has NO relationship with Sectigo or gets any compensation from them.
Open the .PEM file with a text editor and copy the complete string in the CSR field in your resellers web page. Dont’ forget to include the first and the last line with ‘BEGIN’ and ‘END’!
NOTE (again, as it is so important): The key file with your private key is NOT part of the CSR. The private key stays on your computer! You will need it later when importing the certificate in the firewall.
You should be asked how you want to confirm that you are a valid owner of the domain. Here are some examples of popular methods:
E-mail: Sending a confirmation email to domain-related addresses.
HTTP hash: checking a text file in the root directory of the domain via HTTP
HTTPS hash: check of a text file in the root directory of the domain via HTTPS
CNAME: Check via a CNAME record, which is created in the DNS.
Order your vertificate. After validation you should get the option to download the certificate in various formats. You also have to download the providers certificate (key chain) where your certificate belongs to.
The end entity certificate is issued by ‘Sectigo RSA Domain Validation Secure Server CA’. So from your point of view this is the CA you need to import later.
Download the certificate + intermediate certificate + RootCA from the certificate provider.
Import them in XCA - this allows you to store them secure and export them in any variant you could need in the future.
Export the private key you created earlier in PEM format.
Import the certificate in NetWall
Click ‘Add Certificate’ under /Objects /General /Key Ring.
Import the ‘Sectigo RSA Domain Validation Secure Server CA’ in CRT or CER format. As we do not import a private key the key will show with certificate type ‘Remote’.
Import the certificate ‘yourserver.yourdomain.com’ in CRT or CER format. Also make sure to import the private key of your certificate you exported in a previous step. The certificate type will now show as ‘Local’
Activate the certificate
Go to /System /Device /Device Settings /Remote Management. Click on Advanced Settings.
In the section ‘WebUI’ select your certificate as HTTPS Certificate. Add the RootCA ‘CERT_sectigo-rsa-dv-ca’ under HTTPS Root Certificates.
Save & Activate the configuration.
Check the certificate you see in the browser when accessing the WebUI admin interface. Now you are using the new public certificate.
2 Feb, 2021 core sslvpn macos certificate
22 Mar, 2021 core ipsec routing
17 Jun, 2021 core ipsec routing
14 Apr, 2021 core license ipsec
8 Sep, 2020 core ipsec rules access
16 Sep, 2020 vpn ipsec ikev2 windows howto dh
30 Nov, 2020 core ipsec license memory
18 Feb, 2021 core connections ipsec memory