Manual Installation Of Local Certificates In Nsm; Certificate Authority Configuration In Nsm Overview - Juniper NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01 Manual

Configuring screenos devices guide
Hide thumbs Also See for NETWORK AND SECURITY MANAGER 2010.4 - CONFIGURING SCREENOS DEVICES GUIDE REV 01:
Table of Contents

Advertisement

Configuring ScreenOS Devices Guide
Related
Documentation

Manual Installation of Local Certificates in NSM

Related
Documentation

Certificate Authority Configuration in NSM Overview

272
Manual Installation of Local Certificates in NSM on page 272
Certificate Authority Configuration in NSM Overview on page 272
Loading Local Certificate into NSM Management System on page 270
If you did not use SCEP, you must manually contact your CA and use the device public
key to create a local device certificate. After you have obtained the local certificate (.cer)
file from your CA, install that certificate on the device:
Right-click the device and select Certificates > Update Fulfilled Certificate. This
1.
directive uses the information in the management system to update the information
about the physical system.
Load the certificate file and click OK to install the local certificate on the device.
2.
NOTE: For devices running ScreenOS 5.x, you must install a TFTP server
on the NSM device server. The device server automatically uses TFTP to
load the local certificate onto your managed devices. For more information
about creating a TFTP server on the device server, see the Network and
Security Manager Installation Guide.
A Job Manager window appears to display job information and job progress. When
the job is complete, close the Job Manager window.
View the local certificate by double-clicking the device configuration and selecting
3.
VPN Settings > Local Certificates. The certificate status appears as active, indicating
that the certificate file has been successfully installed on both the physical device
and the management system.
For devices running ScreenOS 5.1 and later, the device server automatically uses Secure
Server Protocol (SSP) (the protocol used for the management connection) to load the
local certificate.
Certificate Authority Configuration in NSM Overview on page 272
Installing CA Certificates Using SCEP in NSM on page 273
Installing Local Certificates Using SCEP in NSM on page 271
A CA certificate validates the identity of the third party CA that issued the local device
certificate. To view the available CA certificates on a device, in the device navigation tree,
select VPN Settings > CA Certificates.
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

Table of Contents