Installation Instructions for SonicWALL Offloaders

General Information ID:    INFO133    Updated:    08/02/2017

Description

This document provides instructions for installing SSL certificate. If you are unable to use these instructions for your server, Symantec recommends that you contact either the vendor of your software or an organization that supports SSL Offloaders.
 

Step 1: Download the SSL Certificate & Intermediate CA Certificate

  1. Download the certificate from Symantec Trust Center account.
  2. The ZIP file you downloaded contains the following certificates:
    Note: Select the server platform as Other when downloading the certificate.
    • SSL certificate (i.e. ssl_certificate.cer, also known as end entity certificate, public key certificate, digital certificate or identity certificate).
    • Intermediate CA certificate (i.e. IntermediateCA.cer, also known as chained certificate or signer/issuer of the ssl certificate).
  3. Unzip the files onto the server where you will install the certificate.
 
Step 2: Rename SSL & Intermediate CA certificate to .pem file
  1. Certificate file extension of the SSL & Intermediate CA certificates obtain from Step 1 will have to be renamed to .pem.
    For example:
    • ssl_certificate.cer to ssl_certificate.pem
    • IntermediateCA.cer to IntermediateCA.pem
       

Step 3: Set up the chained Certificate

  1. Now that you have the proper certificates, load the certificates into certificate objects.
  2. These separate certificate objects are then loaded into a certificate group. This example demonstrates how to load two certificates into individual certificate objects, create a certificate group, and enable the use of the group as a certificate chain.

    Note: In the example, the name of the Transaction Security device is myDevice. The name of the secure logical server is server1. The name of the PEM-encoded certificate for your domain name is ssl_certificate.pem; the name of the PEM-encoded certificate chain is IntermediateCA.pem. The names of the recognized and local certificate objects are trustedCert and myCert, respectively. The name of the certificate group is CACertGroup.
     
  3. Start the configuration manager
  4. Attach the configuration manager and enter Configuration mode. (If an attach or configurationlevel password is assigned to the device, you are prompted to enter any passwords.)

    inxcfg> attach myDevice
    inxcfg> configure myDevice
    (config[myDevice])>

     
  5. Enter SSL Configuration mode and create an Intermediate certificate named CACert, entering into Certificate Configuration mode. Load the PEM-encoded file into the certificate object, and return to SSL Configuration mode.

    (config[myDevice])> ssl
    (config-ssl[myDevice])> cert myCert create
    (config-ssl-cert[CACert])> pem IntermediateCA.pem
    (config-ssl-cert[CACert])> end
    (config-ssl[myDevice])>

     
  6. Enter Key Association Configuration mode, load the PEM-encoded CA certificate and private key files, and return to SSL Configuration mode.

    (config-ssl[myDevice])> keyassoc localKeyAssoc create
    (config-ssl-keyassoc[localKeyAssoc])> pem ssl_certificate.pem
    (config-ssl-keyassoc[localKeyAssoc])> end
    (config-ssl[myDevice])>

     
  7. Enter Certificate Group Configuration mode, create the certificate group CACertGroup, load the certificate object CACert, and return to SSL Configuration mode.

    (config-ssl[myDevice])> certgroup CACertGroup create
    (config-ssl-certgroup[CACertGroup])> cert myCert
    (config-ssl-certgroup[CACertGroup])> end
    (config-ssl[myDevice])>

     
  8. Enter Server Configuration mode, create the logical secure server server1, assign an IP address, SSL and clear text ports, a security policy myPol, the certificate group CACertGroup, key association localKeyAssoc, and exit to Top Level mode.

    (config-ssl[myDevice])> server server1 create
    (config-ssl-server[server1])> ip address 10.1.2.4 netmask 255.255.0.0
    (config-ssl-server[server1])> sslport 443
    (config-ssl-server[server1])> remoteport 81
    (config-ssl-server[server1])> secpolicy myPol
    (config-ssl-server[server1])> certgroup chain CACertGroup
    (config-ssl-server[server1])> keyassoc localKeyAssoc
    (config-ssl-server[server1])> end
    (config-ssl[myDevice])> end
    (config[myDevice])> end
    inxcfg>

     
  9. Save the configuration to flash memory. If it is not saved, the configuration is lost during a power cycle or if the reload command is used.

    inxcfg> write flash myDevice
    inxcfg>

     
  10. To verify if your certificate is installed correctly, use the Symantec Installation Checker



Sonicwall SSL Offloader 

          For more information, see the Sonicwall Documentation.

 

Contact Support

Find Answers