Link . Contact Us . English
 


Global Trust & Global Digital SSL Seal說明:
只要您有購買安裝寰宇認證中心的Web SSL伺服器數位憑證,您就可以在您的網頁上放置(Global Trust的標章)同時可以安裝寰宇數位(Global Digital )的標章,而寰宇數位標章除了為中文認證服務外,還提供了額外的安全認證內容。

這兩個標章都是為了讓網路使用者能夠確認您網路位址的安全定位和有效性,進行安全的電子商務交易服務,兩種圖章各有不同的 認證功能及認證說明頁,提供您更完整的服務。



優點說明
支援的產品種類
寰宇數位SSL產品比較表
國內各家SSL比較表
標準與強制型憑證比較表
價格比較
技術比較
下載申請同意書
申請流程說明
CSR線上測試
GlobalTrust標章
申請免費30天憑證
如何安裝寰宇數位
 及GlobalTrust標章

最新消息/活動訊息
優惠方案
經銷服務洽詢

標章更新說明

IE 6.0 免費升級
如何升級瀏覽器至128bit加密?




Importing a Server Certificate and Chain into the
SonicWALL SSL Offloader

1.安裝說明


Chained Certificates

All SonicWALL SSL Offloaders support chained certificates. Once the certificates are unzipped into multiple certificates prior to importing into the SonicWALL SSL Offloader, the certificate will need to be imported using the chained certificate commands. The certificates will have a root certificate, and an intermediate certificate in addition to the CA server certificate.

EXAMPLE - Instructions for using OpenSSL

Now that you have received the certificate, you will need to unzip the certificates up into the root, intermediate and the server certificates so that you can enter them into the SonicWALL SSL Offloader.

Start by unzipping the 3 certificates, you will only need the ComodoSecurityServicesCA.crt and domain.crt certificates.

Launch openssl.exe. This application was installed at the same time and in the same location as the SonicWALL configuration manager. You can also run the install and just install OpenSSL by choosing the 'Custom Installation' option.

Once launched, open the ComodoSecurityServicesCA.crt and domain.crt certificates in a text editor

You will need to copy and paste the entire text including
-----BEGIN CERTIFICATE-----
and
-----END CERTIFICATE-----

The domain.crt certificate is the server certificate.
The ComodoSecurityServicesCA.crt is the intermediary certificate.

Save these files (e.g. C:\server.pem and C:\inter.pem)

Verify the certificate information with openssl:
x509 -in C:\server.pem -text
(and)
x509 -in :C\inter.pem -text

 

EXAMPLE - Setting Up the Chained Certificates

Now that you have the proper certificates, you start by loading the certificates into certificate objects. These separate certificate objects are then loaded into a certificate group. This example demonstrates how to load two certificates into individual certificate objects, create a certificate group, and enable the use of the group as a certificate chain. The name of the Transaction Security device is myDevice. The name of the secure logical server is server1. The name of the PEM-encoded, CA generated certificate is server.pem; the name of the PEM-encoded certificate is inter.pem. The names of the recognized and local certificate objects are trustedCert and myCert, respectively. The name of the certificate group is CACertGroup.

Start the configuration manager as described in the manual.

Attach the configuration manager and enter Configuration mode. (If an attach or configurationlevel password is assigned to the device, you are prompted to enter any passwords.)
inxcfg> attach myDevice
inxcfg> configure myDevice
(config[myDevice])>
 

Enter SSL Configuration mode and create an intermediary certificate named CACert, entering into Certificate Configuration mode. Load the PEM-encoded file into the certificate object, and return to SSL Configuration mode. (config[myDevice])> ssl
(config-ssl[myDevice])> cert myCert create
(config-ssl-cert[CACert])> pem inter.pem
(config-ssl-cert[CACert])> end
(config-ssl[myDevice])>
 

Enter Key Association Configuration mode, load the PEM-encoded CA certificate and private key files, and return to SSL Configuration mode.
(config-ssl[myDevice])> keyassoc localKeyAssoc create
(config-ssl-keyassoc[localKeyAssoc])> pem server.pem key.pem
(config-ssl-keyassoc[localKeyAssoc])> end
(config-ssl[myDevice])>
 

Enter Certificate Group Configuration mode, create the certificate group CACertGroup, load the certificate object CACert, and return to SSL Configuration mode.
(config-ssl[myDevice])> certgroup CACertGroup create
(config-ssl-certgroup[CACertGroup])> cert myCert
(config-ssl-certgroup[CACertGroup])> end
(config-ssl[myDevice])>
 

Enter Server Configuration mode, create the logical secure server server1,assign an IP address, SSL and clear text ports, a security policy myPol, the certificate group CACertGroup, key association localKeyAssoc, and exit to Top Level mode. (config-ssl[myDevice])> server server1 create
(config-ssl-server[server1])> ip address 10.1.2.4 netmask 255.255.0.0
(config-ssl-server[server1])> sslport 443
(config-ssl-server[server1])> remoteport 81
(config-ssl-server[server1])> secpolicy myPol
(config-ssl-server[server1])> certgroup chain CACertGroup
(config-ssl-server[server1])> keyassoc localKeyAssoc
(config-ssl-server[server1])> end
(config-ssl[myDevice])> end
(config[myDevice])> end
inxcfg>

Save the configuration to flash memory. If it is not saved, the configuration is lost during a power cycle or if the reload command is used.
inxcfg> write flash myDevice
inxcfg>
 

Resources

Additional documents and technical notes on SonicWALL SSL can be found online at http://www.sonicwall.com/support/ssl_documentation.html
 


關於Global Trust 寰宇認證中心   瀏覽器安全更新   隱私權政策   合作提案   經銷商專區   連絡方式

Design By Foxstreet