Replace the Default Self-Signed Certificate with a 3rd Party SSL Certificate on the RV34x Series Router

Similar documents
Configure a Site-to-Site Virtual Private Network (VPN) Connection on an RV340 or RV345 Router

SSL Certificate Based VPN

Best Practices for Security Certificates w/ Connect

How to Set Up External CA VPN Certificates

How to Enable Client Certificate Authentication on Avi

Configuring SSL. SSL Overview CHAPTER

Certificate Renewal on Cisco Identity Services Engine Configuration Guide

Manage Certificates. Certificates Overview

Configuring SSL CHAPTER

Cisco QuickVPN Installation Tips for Windows Operating Systems

Configuring SSL. SSL Overview CHAPTER

CYAN SECURE WEB HOWTO. SSL Intercept

CSM - How to install Third-Party SSL Certificates for GUI access

vcloud Director Tenant Portal Guide vcloud Director 8.20

Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls

Securing Connections with Digital Certificates in Router OS. By Ezugu Magnus PDS Nigeria

This document describes the configuration of Secure Sockets Layer (SSL) decryption on the FirePOWER Module using ASDM (On-Box Management).

Create Decryption Policies to Control HTTPS Traffic

Please select your version. Installation Instructions for BIG-IP F5 version 9.x and 10.x. Installation Instructions for F5 BIG-IP version 11

Unified Contact Center Enterprise (UCCE) Single Sign On (SSO) Certificates and Configuration

App Orchestration 2.6

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

LDAP Directory Integration

Creating and Installing SSL Certificates (for Stealthwatch System v6.10)

Managing Certificates

Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at

Trust Infrastructure of SSL

Certificates for Live Data

Configuring Certificate Authorities and Digital Certificates

LDAP Directory Integration

Managing Security Certificates in Cisco Unified Operating System

Send documentation comments to

Secure IIS Web Server with SSL

Certificates. To Create a Certificate. Barracuda Web Application Firewall

Viewing System Status, page 404. Backing Up and Restoring a Configuration, page 416. Managing Certificates for Authentication, page 418

Managing Certificates

Using SSL to Secure Client/Server Connections

Mitel MiVoice Connect Security Certificates

VMware Horizon View Deployment

Certificates for Live Data Standalone

The VPN menu and its options are not available in the U.S. export unrestricted version of Cisco Unified Communications Manager.

Installing an SSL certificate on your server

Digital Certificates. About Digital Certificates

IceWarp SSL Certificate Process

Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3. Obtaining A Signed Certificate 4

Configuration Example for Secure SIP Integration Between CUCM and CUC based on Next Generation Encryption (NGE)

BIG-IP System: SSL Administration. Version

Configuration Guide. Ingate SIParator /Firewall E-SBC with Microsoft Office 365 Unified Messaging (UM)

UCS Manager Communication Services

Integration Guide. Dell EMC Data Domain Operating System and Gemalto KeySecure. DD OS and Gemalto KeySecure Integration. Version 6.

Use Shrew Soft VPN Client to Connect with IPSec VPN Server on RV130 and RV130W

But where'd that extra "s" come from, and what does it mean?

The information in this document is based on these software and hardware versions:

SAML-Based SSO Configuration

A 2012 RD Gateway server uses port 443 (HTTPS), which provides a secure connection using a Secure Sockets Layer (SSL) tunnel.

H O W T O I N S T A L L A N S S L C E R T I F I C A T E V I A C P A N E L

ASA 8.x: Renew and Install the SSL Certificate with ASDM

VPN Tracker for Mac OS X

How to Set Up an IPsec Connection Between Two Ingate Firewalls/SIParators. Lisa Hallingström Paul Donald

VPN Client. VPN Client Overview. VPN Client Prerequisites. VPN Client Configuration Task Flow. Before You Begin

DEPLOYMENT GUIDE. SSL Insight Certificate Installation Guide

Using ISE 2.2 Internal Certificate Authority (CA) to Deploy Certificates to Cisco Platform Exchange Grid (pxgrid) Clients

VPN Tracker for Mac OS X

Security Digital Certificate Manager

V1.0 Nonkoliseko Ntshebe October 2015 V1.1 Nonkoliseko Ntshebe March 2018

Authentication, Encryption, Transport, IP Version and VPN Routing

Securing ArcGIS Server Services An Introduction

IBM. Security Digital Certificate Manager. IBM i 7.1

IEA 2048 Bit Key Support for CSR on IEA Configuration Example

Configuration of an IPSec VPN Server on RV130 and RV130W

Integrate the Cisco Identity Services Engine

Securing ArcGIS Services

Director and Certificate Authority Issuance

Configuring Sonus SBC 1000/2000 with Microsoft Office 365. Application Notes Last Updated April 16, 2013

Please select your version

Please select your version

IBM Presentations: Implementing SSL Security in WebSphere Partner Gateway

Configuration of Microsoft Live Communications Server for Partitioned Intradomain Federation

ISY994 Series Network Security Configuration Guide Requires firmware version Requires Java 1.8+

LAB :: Secure HTTP traffic using Secure Sockets Layer (SSL) Certificate

System Configuration. The following topics explain how to configure system configuration settings on Firepower Management Centers and managed devices:

Firmware/Language Upgrade on the RV130 and RV130W Using the Web Interface

How to Set Up VPN Certificates

Validation Working Group: Proposed Revisions to

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

S/MIME Security Services

S/MIME Security Services

Skype for Business Configuration for Partitioned Intradomain Federation

High Level View of Certificates and Authorities in CUCM

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configuring Microsoft ADFS for Oracle Fusion Expenses Mobile Single Sign-On

How to Configure SSL Interception in the Firewall

How to Generate and Install a Certificate on a SMA

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

Secure Web Appliance. SSL Intercept

Comprehensive Setup Guide for TLS on ESA

Importing a Global Server Certificate from Verisign and other PKCS#7 certificates into the SonicWALL SSL Accelerator

AirWatch Mobile Device Management

This help covers the ordering, download and installation procedure for Odette Digital Certificates.

Grandstream Networks, Inc. GWN7000 OpenVPN Site-to-Site VPN Guide

Transcription:

Replace the Default Self-Signed Certificate with a 3rd Party SSL Certificate on the RV34x Series Router Introduction A digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows relying parties to depend upon signatures or assertions made by the private key that corresponds to the public key that is certified. A router can generate a self-signed certificate, a certificate created by a network administrator. It can also send out requests to Certificate Authorities (CAs) to apply for a digital identity certificate. It is important to have legitimate certificates from third-party applications. There are two ways that CA signs the certificates: 1. CA signs the certificate with private keys. 2. CA signs the certificates using Certificate Signing Request (CSR) generated by the RV34x. Most commercial certificate vendors use intermediate certificates. As the intermediate certificate is issued by the Trusted Root CA, any certificate issued by the intermediate certificate inherits the trust of the Trusted Root, like a certification chain of trust. Objective This article aims to show how to request and upload a 3 rd party Secure Sockets Layer (SSL) certificate issued by a CAA to replace the self-signed certificate on the RV34x Router. Applicable Devices RV340 RV340W RV345 RV345P Software Version 1.0.01.17 Replace the Default Self-Signed Certificate with a 3 rd Party SSL Certificate Note: The images below are taken from the RV345 Router. Generate a CSR

Step 1. Log in to the web-based utility of the router and choose Administration > Certificate. Step 2. Under the Certificate Table, click the Generate CSR/Certificate button. Step 3. In the Generate CSR/Certificate window,click the Type drop-down arrow and choose Certificate Signing Request. Step 4. Enter a name for the certificate in the Certificate Name field.

Note: In this example, 34xrouter is used. Step 5. Enter an alternative name in the Subject Alternative Name field and then click the FQDN radio button below it to match. The alternative name will be the domain name that can be used to access the router. Note: In this example, RVrouter.com is used. Step 6. Click the Country Name drop-down arrow to choose the country of your location. Note: In this example, US - United States is chosen. Step 7. Enter the name of the state or province in the State or Province Name(ST) field. Note: In this example, California is used. Step 8. Enter the locality in the Locality Name(L) field. Note: In this example, Irvine is used. Step 9. Enter the Organization Name(O) in the field provided.

Note: In this example, Cisco is used. Step 10. Enter the Organization Unit Name(OU) in the field provided. Note: In this example, SBKM is used. Step 11. Enter a name in the Common Name(CN) field. Note: In this example, 34xrouter is used. Step 12. Enter your email address or any email address where you want the certificate to be sent. Note: In this example, a gmail.com email address is used. Step 13. Choose a Key Encryption Length from the drop-down menu to set the number of bits in your key. The default length is 512.

Note: In this example, 2048 is used. This is highly recommended since a longer encryption is more difficult to decode compared to shorter keys, thus, making it more secure. Step 14. Click Generate. The certificate request you have created will now appear in the Certificate Table. You now have successfully generated a CSR. Export the CSR Step 1. Check the box beside the certificate request in the Certificate Table and click Export. Step 2. Click Download in the Export Certificate window to download the file into your computer in PEM format.

You now have successfully exported the CSR into your computer. Upload the CSR to the Certificate Provider Step 1. Open the downloaded file using a notepad and copy the CSR then paste it into the field provided in the 3 rd party SSL certificate provider site. Note: In this example, Comodo.com is used as the certificate provider. Step 2. Select the server software used to generate the CSR. In this case, since the RV34x router is not on the list, OTHER is chosen. Step 3. Download your certificate into your computer. Upload the 3 rd SSL Party Certificate Step 1. In the web-based utility of the router, click the Import Certificate button under the

Certificate Table. Step 2. In the Import Certificate window, click the Type drop-down menu and choose CA Certificate. Step 3. Enter a Certificate Name in the field provided. Note: In this example, RV34xCert is used. Step 4. Click the Choose File button and locate the certificate file you have downloaded from the CA.

Step 5. Click on the file and then click Open. Step 6. Click Upload. The Certificate Table will now show the new certificate name and the type is now replaced with CA certificate with the label that it has been signed by the 3 rd party CA.

You now have successfully uploaded a 3 rd party SSL certificate on the RV34x Router. Replace the Default Self-Signed Certificate Step 1. In the web-based utility, choose VPN > SSL VPN. Step 2. Click the On radio button to enable the Cisco SSL VPN Server.

Step 3. Under Mandatory Gateway Settings, click the Certificate File drop-down menu and replace the default certificate by choosing the newly uploaded SSL certificate. Step 4. Enter the required Client Domain in the field provided. Note: In this example, RVrouter.com is used. Step 5. Click Apply.

You now have successfully replaced the default self-signed certificate with the 3 rd party SSL certificate.