Go to the table of contents Go to the previous page Go to the next page View or print as PDF
CVE Best Practices
Certificate verification is essential to HTTPS security. If mismanaged, HTTPS security and the security of your network can be compromised and significantly weakened.
Certificate verification is an investment.
*
*
Certificate checks may also fail in unexpected ways that also require user education, as well as administrative effort in the form of investigation and remediation.
When using SSL certificate verification, therefore, you need to know:
*
*
To administer certificate verification, you need to:
*
*
*
*
*
 
Important 
You should not use Content Gateway to proxy internal traffic.
If you plan to use the CVE, be sure to acquaint yourself with these topics:
*
*
CVE configurations
This section describes a phased approach to deploying certificate verification.
It is recommended that in addition to the production environment, Content Gateway be installed in a controlled test environment in which phased configuration can be tested and monitored, and problems remediated and tested again. When the test environment is functioning as desired, the configuration can be rolled out to the production environment with continued monitoring and testing.
The starting point assumes that Content Gateway is stable and SSL support is off.
The phases of SSL and CVE deployment include:
1.
This automatically enables the options for certificate verification engine (CVE), verification of the entire certificate chain, and denial of self-signed certificates.
2.
The entire certificate chain is validated for each CVE check enabled.
Enabling SSL support
Before enabling SSL support, verify that Content Gateway:
*
*
*
*
*
*
*
*
*
*
When the above conditions are met:
*
*
*
*
*
*
*
*
*
Enabling the CVE
Now that SSL support is on and stable, with Deny self-signed certificates and Verify entire certificate chain enabled, enable the CVE with CRL checking enabled. The CRL check is an essential certificate verification check that rarely fails in error.
Repeat the testing performed after SSL was enabled.
 
Note 
At this stage, to minimize disruption to users, you may also want to enable Verification Bypass. See CVE with Verification Bypass enabled.
Adding CVE checks to the configuration
When you are satisfied with certificate verification using Deny self-signed certificates and Verify entire certificate chain with the CRL check, you can start to enable additional verification options. Enable options one at a time and repeat the same testing procedures.
 
Note 
For each option enabled, when there is a certificate verification failure, an incident is added to the Incident List. Begin troubleshooting by examining the Incident List. See Troubleshooting Certificate Verification Failures.
 
Important 
For more information on CVE options, see Validating certificates.
CVE with Verification Bypass enabled
In addition to the verification options, SSL support includes an option for Verification Bypass (Configure > SSL > Validation > Verification Bypass). This feature is turned on by default and means that when certificate verification fails, a dialog box warns the user that a failure has occurred and gives the user the option to go to the site anyway.
Advantages include:
*
*
*
*
Disadvantages include:
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2022 Forcepoint. All rights reserved.