Last adaptation to the version: 12.6.0
- Updated to Redesign of the webinterface
General
The Securepoint firewall uses digital certificates for authentication for various functions:
- VPN connections
- SSL Interception
- Captive Portal
- Mailrelay
- Reverse Proxy
Certificates are intended to certify the identity of the holder.
They are
- issued by the Securepoint Appliance and signed by the appliance's own CA (Certification Authority; also called root certificate).
- The CA itself is also a certificate that must first be created on the Apliance in order to create certificates, because certificates must be signed with the CA when they are created.
- issued by a ACME service and certified by it. Available here Let's Encrypt.
The following shows how certificates are created and signed by the UTM.
Create CA
- Menu CA Button Area
Create server and client certificate
Nun kann ein Zertikikat für einen Server oder Client erstellt werden. Dies geht unter: Zertifikate Button
Area notempty
ACME certificates (Let's Encrypt)
ACME
Area
Caption | Value | Description | UTMuser@firewall.name.fqdnAuthentifizierung ![]() |
---|---|---|---|
Activated: | Yes | Enables the use of ACME certificates. For more information see below Activate ACME service. | |
Use system-wide nameservers for ACME challenges: | Yes | If the addresses for the servers for the extension of the ACME challenges cannot be resolved via the system-wide nameserver (e.g. due to configured relay or foreward zones), alternative nameservers can be entered by deactivating No. | |
Nameserver for ACME challenges: Can be used for ACME challenges when system-wide nameserver is disabled |
»85.209.185.50»85.209.185.51»2a09:9c40:1:53::1»2a09:9c40:1:53::2 | Here you can enter the nameservers for the ACME-Challenges. | |
Activate ACME service
Activate ACME service
Um ACME Zertifikate nutzen zu können, muss dies unter ACME Aktiviert: Ja aktiviert werden.
Area- Sobald der Dienst aktiviert wurde und dies mit gespeichert wurde, wird der Link zu den Nutzungsbedingungen geladen und es lassen sich die Einstellungen aufrufen.
- With the button Activate Yes and the storage of an Email address for notifications by the ACME service provider (here: Let's Encrypt), the information can be saved with
- A dialog will appear with a link to the Terms of Use, which must be accepted Yes.
Generate token
Generate token
spDYN To generate the certificates, the ACME token must first be generated in the spDYN portal.
Within the spDYN portal, the corresponding host must be opened.
- Call up spDyn Host
- Select the ACME Challenge Token from the Token drop-down menu.
- Generate token
notemptyThe token is displayed once during generation and cannot be displayed again.
The token should be noted and stored safely.
Renewal of ACME certificates
Renewal of ACME certificates
ACME Certificates
ACME CertificatesImport certificates / CAs
Certificates and CAs can be imported with the
Import format
Certificates and CAs to be imported into a UTM must be in the format .pem or .p12 (pkcs12).
Error message during import
During import, the error message "The certificate format is not supported..." may appear.
Password protected certificates in pkcs12 format (.p12 , .pfx , .pkcs12) in conjunction with older ciphers can trigger this error.
Frequent status messages:
Status | Description | Note |
---|---|---|
KEY | The public and private key are present | It can be encrypted and decrypted: |
VALID | The certificate is valid | It can be encrypted and decrypted: |
INIT | The certificate is being initialized (ACME certificates only) | |
KEY | The private key is not present | It can only be encrypted, but not decrypted. |
UNABLE TO GET CERTIFICATE CRL | No current CRL could be found. | |
UNABLE TO GET LOCAL ISSUER CERTIFICATE | The local issuer cannot be found. This occurs when the issuer certificate of an untrusted certificate cannot be found. |
|
certificate has expired | The certificate has expired. The notAfter date is before the current time. |
|
certificate is not yet valid | The certificate is not yet valid: the notBefore date is after the current time. | |
CRL is not yet valid | CRL is not yet valid | |
CRL has expired | CRL has expired | |
certificate revoked | The certificate has been revoked. | In production environments, revoked certificates should not be restored. In this case, creating a new certificate is usually the better solution. |
unsupported or invalid name syntax UNSUPPORTED_CONSTRAINT_SYNTAX |
Unsupported or invalid name constraint syntax | The name constraint format is not considered: for example, an email address format of a form not mentioned in RFC3280. For example, a -. |
CRL lokal generiert | The CRL was created on this device | Either it is a certificate that was created locally, or no matching CRL has been imported (yet). |
CRL importiert | The CRL was imported |
Export certificates / CAs
Revoke certificates / CAs
Tab CA / Certificates | ||
Revokes a certificate or a CA. The security prompt must be confirmed with Yes. If multiple certificates are to be revoked, the display of the security prompt can be temporarily disabled.
|
UTMuser@firewall.name.fqdnAuthentication ![]() | |
Revoke | ||
Displays all revoked CAs and certificates with associated CAs | ![]() | |
Unblocks a CA or certificate and restores it. | ||
Deletes the certificate | ||
CRLs | ||
Displays all CAs and certificates with their status and the type of CRL | ![]() | |
Exports the CRL of a CA or certificate | ||
Imports a CRL | ||
ACME | ||
On | Enables ACME services (Automatic Certificate Management Environment) See ACME Certificates |