Jump to:navigation, search
Wiki






























De.png
En.png
Fr.png






Last adaptation to the version: 12.5.1
New:
notempty
This article refers to a Resellerpreview
-
Access: UTM-IP:Port or UTM-URL:Port
Port as configured at Network / Appliance Settings / Webserver
Default-Port: 11115
i.e.: https://utm.ttt-point.de:11115
Default: https://192.168.175.1:11115
→ Authentication →Certificates


Display the content of this page at




Import format

Import format

Certificates and CAs to be imported into a UTM must be in the format .pem or .p12 (pkcs12).

Certificates can be converted with the tool openssl - available for all common platforms (part of Linux, call via console) - and the following commands:

Certificate Command
X509 to PEM openssl x509 -in certificatename.cer -outform PEM -out certificatename.pem
DER to PEM openssl x509 -inform der -in certificate.cer -out certificate.pem
P7B to PEM openssl pkcs7 -print_certs -in certificate.p7b -out certificate.pem


Error message during import

During import, the error message "The certificate format is not supported..." may appear.
Password protected certificates in pkcs12 format (.p12 , .pfx , .pkcs12) in conjunction with older ciphers can trigger this error.

Import is usually possible if in the tab General notempty
New as of v12.5.1
the option Support legacy cryptographic algorithms On is enabled. notempty
Requires a This will interrupt all connections (incl. VPN connections) to the UTM!

Options for importing certificates:

  • Convert certificate to *.pem
    Certificates can be converted with the tool openssl - available for all common platforms (part of Linux, call via console) - and the following commands:
    openssl pkcs12 -in Zertifikat.pfx -out Zertifikat.pem -nodes
    Alternatively with the help of an online service

  • CLI commands to allow certificate import with obsolete ciphers in the UTM
    extc global set variable GLOB_ENABLE_SSL_LEGACY value 1
    appmgmt config application "securepoint_firewall"
    appmgmt config application "fwserver"
    system reboot

    notempty
    Requires a This will interrupt all connections (incl. VPN connections) to the UTM!
cli> extc global get variable GLOB_ENABLE_SSL_LEGACY 
variable              |value
----------------------+-----
GLOB_ENABLE_SSL_LEGACY|0  

cli> extc global set variable GLOB_ENABLE_SSL_LEGACY value 1
OK

cli> extc global get variable GLOB_ENABLE_SSL_LEGACY
variable              |value
----------------------+-----
GLOB_ENABLE_SSL_LEGACY|1

cli> appmgmt config application "securepoint_firewall"
cli> appmgmt config application "fwserver"