Configuration Security - SonicWALL SSL-R User Manual

Secure sockets layer ffloading solutions that allow servers to provide both secure and non-secure services at the same high speeds
Hide thumbs Also See for SSL-R:
Table of Contents

Advertisement

To generate an encrypted 1024-bit key, enter this command at the prompt:
genrsa -des3 -out key1024.pem 1024
You must specify a passphrase needed later for security purposes. Make sure that you back
up the key and remember the passphrase.
Generating Certificates
You can generate certificate signing requests and self-signed root certificates to use for
testing.
The openssl_config.txt file must be in the current working directory. If it is not,
Note:
you must specify the path to the file. For Windows NT and Windows 2000, the
current default working directory is Programs\SonicWALL Corporation\
SonicWALL Configuration Manager , and openssl_config.txt is located there
by default. For Linux and Solaris, the current working directory is the directory from
which you executed OpenSSL. However, the openssl_config.txt file is located in
the /etc directory of the root. When you see the openssl_config.txt file name
in a listing, you must add "/etc/" before entering it.
To create an unencrypted private key and generate a certificate request from it, enter the
following command lines at the prompt:
genrsa -out key.pem 1024
req -new -key key.pem -out req.pem -config openssl_config.txt
To create a self-signed root certificate valid for 30 days, enter the following commands:
genrsa -out key.pem 1024
req -new -x509 -out cert.pem -key key.pem -config openssl_config.txt
You are prompted for additional information with each commands.

Configuration Security

SonicWALL SSL appliances allow easy, flexible configuration without compromising the
security of your network or their own configuration.
Passwords
SonicWALL SSL appliances use two levels of password protection: access- and enable-level.
Access-level passwords control who can attach the configuration manager to the specific
device and view statistics and other nonsensitive data. Enable-level passwords control who
can view the same data available with access-level passwords as well as view sensitive data
and configure the device.
SSL devices are shipped without passwords. Setting passwords is important because the
device can be administered over a network. For more information about passwords, see
the commands password access and password enable in Chapter C Command
Summary.
Page 30 SSL-IA/SSL-R User's Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ssl-ia

Table of Contents