PositiveSSL Certificate Installation: SonicWall SSL Offloader

Importing a Server Certificate and Chain into the SonicWALL SSL Offloader


You will be receiving the following four files from Sectigo:

  • Root AddTrustExternalCARoot.crt
  • Intermediate CA UTNAddTrustServerCA.crt
  • Intermediate CA PositiveSSLCA.crt
  • domain/site certificate yourdomainname.crt

Or click to download the PositiveSSL CA files


Chained Certificates

  • All SonicWALL SSL Offloaders support chained certificates.
  • Once the certificates are unzipped into multiple certificates prior to importing into the SonicWALL SSL Offloader, the certificate will need to be imported using the chained certificate commands.
  • The certificates will have a
    • root certificate,
    • and an intermediate CA certificate in addition to the server/domain certificate.


EXAMPLE - Instructions for using OpenSSL

  • Now that you have received the certificate, you will need to unzip the certificates up into the root, intermediate, and the server certificates so that you can enter them into the SonicWALL SSL Offloader.
  • Start by unzipping the 4 certificates, you will only need the Intermediate CA file(UTNAddTrustServerCA.crt,PositiveSSLCA.crt) and your Site/Domain certificates.
  • Launch openssl.exe. This application was installed at the same time and in the same location as the SonicWALL configuration manager. You can also run the install and just install OpenSSL by choosing the 'Custom Installation' option.
  • Once launched, open the first Intermediate CA(UTNAddTrustServerCA.crt) file and Site/Domain certificates in a text editor
  • You will need to copy and paste the entire text including

-----BEGIN CERTIFICATE-----
and
-----END CERTIFICATE-----

  • Next, open the second intermediate certificate, PositiveSSLCA.crt.Repeat the process and paste into the same document.
  • Your final doc should look something like this:

-----BEGIN CERTIFICATE----- MIIEhjCCA26gAwIBAgIQUkIGSk83/kNpSHqWZ/9dJzANBgkqhkiG9w0BAQUFADBv

MQswCQYDVQQGEwJTRTEUMBIGA1UEChMLQWRkVHJ1c3QgQUIxJjAkBgNVBAsTHUFk
.....
7uRJQ8E5fc8vlqd1XX5nZ4TlWSBAvzcivwdDtDDhQ4rNA11tuSnZhKf1YmOEhtY3
vm9nu/9iVzmdDE2yKmE9HZzvmncgoC/uGnKdsJ2/eBMnBwpgEZP1Dy7J72skg/6b
kLRLaIHQwvrgPw==
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
MIIFAzCCA+ugAwIBAgIQTM1KmltFEyGMz5AviytRcTANBgkqhkiG9w0BAQUFADCB
lzELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAlVUMRcwFQYDVQQHEw5TYWx0IExha2Ug
.....
zg5G8t6P2jt9HpOs/PQyKw+rAR+lQI/jJJkfXbKqDLnioeeSDJBLU30fKO5WPa8Y
Z0nf1R7CqJgrTEeDgUwuRMLvyGPui3tbMfYmYb95HLCpTqnJUHvi
-----END CERTIFICATE-----

  • The Site/Domain certificate is the server certificate.
  • The intermediate CA file is the intermediary certificate.
  • Save these files (e.g. C:\\server.pem and C:\\inter.pem)
  • Verify the certificate information with openssl:
    • x509 -in C:\\server.pem -text
    • (and)
    • x509 -in :C\\inter.pem -text


EXAMPLE - Setting Up the Chained Certificates

  • Now that you have the proper certificates, you start by loading the certificates into certificate objects.
  • These separate certificate objects are then loaded into a certificate group.
  • This example demonstrates how to load two certificates into individual certificate objects, create a certificate group, and enable the use of the group as a certificate chain.
  • The name of the Transaction Security device is myDevice.
  • The name of the secure logical server is server1.
  • The name of the PEM-encoded, CA generated certificate is server.pem; the name of the PEM-encoded certificate is inter.pem.
  • The names of the recognized and local certificate objects are trustedCert and myCert, respectively.
  • The name of the certificate group is CACertGroup.


Start the configuration manager as described in the manual.

  • Attach the configuration manager and enter Configuration mode. (If an attach or configurationlevel password is assigned to the device, you are prompted to enter any passwords.)

inxcfg> attach myDevice
inxcfg> configure myDevice
(config[myDevice])>

  • Enter SSL Configuration mode and create an intermediary certificate named CACert, entering into Certificate Configuration mode. Load the PEM-encoded file into the certificate object, and return to SSL Configuration mode. (config[myDevice])> ssl

(config-ssl[myDevice])> cert myCert create
(config-ssl-cert[CACert])> pem inter.pem
(config-ssl-cert[CACert])> end
(config-ssl[myDevice])>

  • Enter Key Association Configuration mode, load the PEM-encoded CA certificate and private key files, and return to SSL Configuration mode.

(config-ssl[myDevice])> keyassoc localKeyAssoc create
(config-ssl-keyassoc[localKeyAssoc])> pem server.pem key.pem
(config-ssl-keyassoc[localKeyAssoc])> end
(config-ssl[myDevice])>

  • Enter Certificate Group Configuration mode, create the certificate group CACertGroup, load the certificate object CACert, and return to SSL Configuration mode.

(config-ssl[myDevice])> certgroup CACertGroup create
(config-ssl-certgroup[CACertGroup])> cert myCert
(config-ssl-certgroup[CACertGroup])> end
(config-ssl[myDevice])>

  • Enter Server Configuration mode, create the logical secure server server1,assign an IP address, SSL and clear text ports, a security policy myPol, the certificate group CACertGroup, key association localKeyAssoc, and exit to Top Level mode. (config-ssl[myDevice])> server server1 create

(config-ssl-server[server1])> ip address 10.1.2.4 netmask 255.255.0.0
(config-ssl-server[server1])> sslport 443
(config-ssl-server[server1])> remoteport 81
(config-ssl-server[server1])> secpolicy myPol
(config-ssl-server[server1])> certgroup chain CACertGroup
(config-ssl-server[server1])> keyassoc localKeyAssoc
(config-ssl-server[server1])> end
(config-ssl[myDevice])> end
(config[myDevice])> end
inxcfg>

  • Save the configuration to flash memory. If it is not saved, the configuration is lost during a power cycle or if the reload command is used.

inxcfg> write flash myDevice
inxcfg>


Resources
Additional documents and technical notes on SonicWALL SSL can be found online at http://www.sonicwall.com/