Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Initial portal settings > Add new appliance information > Generating an appliance certificate
Generating an appliance certificate
Deploying an I Series Appliance | Forcepoint Web Security Cloud
Each appliance should have a valid X.509 version 3 identity certificate in PEM format with an unencrypted key. This certificate can be generated using a variety of tools. Below is a simple procedure using OpenSSL to generate a private key and CA that can be used for your appliance.
This section assumes that you are familiar with OpenSSL and have a working OpenSSL installation.
The following OpenSSL statement creates a 2048-bit RSA private key with a password of 1234:
openssl genrsa -passout pass:1234 -des3 -out CA_key_password.pem 2048
You must supply a password, as OpenSSL does not allow the creation of a private key without one. You can then strip the password from the key as follows:
openssl rsa -in CA_key_password.pem -passin pass:1234 -out CA_key.pem
This also renames the private key file from CA_key_password.pem to CA_key.pem.
Finally, use the following statement to create the CA:
openssl req -x509 -days 11000 -new -sha1 -key CA_key.pem -out CA_cert.pem
Note that this command prompts you to input information about different parameters, such as country, state, locality, or your organization's name.
Once you have created the private key (CA_key.pem) and public certificate (CA_cert.pem), import the certificate to all relevant browsers, and upload the certificate to each appliance using the Certificates tab.
Define internal network settings
The Internal Networks section of the page is used to optionally:
*
*
*
To begin:
1.
Select the Policy Assignment tab and click Add to identify a network to which you want to assign a policy other than the appliance default. In the Add Policy Assignment dialog box:
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Select a Policy from the drop-down list.
e.
Click Add.
Repeat these steps for each internal network to which you want to assign a policy.
Note that networks (IP address ranges and subnets) may not overlap, and you can assign only one policy to each network.
2.
Select the Trusted Networks tab and click Add to identify IP addresses or address ranges whose traffic should not be analyzed. In the Add Trusted Network dialog box:
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Indicate whether to Bypass analysis for traffic from this network, Bypass analysis for traffic to this network, or both.
e.
Click Add.
Repeat these steps for each internal network whose incoming or outgoing traffic, or both, should not be analyzed.
3.
Select the Session-Based Authentication tab and click Add to define network addresses and IP address ranges that should use session-based authentication. The defined addresses will be authenticated based on a cookie sent to the browser on the local machine.
This authentication is valid for the length of time defined in the Session timeout drop-down list (under General).
a.
Enter a unique Name for the network.
b.
Use the Type list to indicate how you want to identify the network (IP address, Subnet, or IP range).
c.
d.
Click Add.
Repeat these steps for each internal network that will use session-based authentication.
 
Note 

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Initial portal settings > Add new appliance information > Generating an appliance certificate
Copyright 2022 Forcepoint. All rights reserved.