Importing Certificate with private key

After a certificate is signed by the CA and returned to you, you can import the certificate into the SonicWALL to be used as a Local Certificate for a VPN Security Association. Use the following steps to import the certificate into the SonicWALL:

1.In the Import Certificate with private key section of Local Certificates, enter the Certificate Name.

2.Enter the Certificate Management Password. This password was created when you exported your signed certificate.

3.Use Browse to locate the certificate file.

4.Click Import, and the certificate appears in the list of Current Certificates.

5.To view details about the certificate, select it from the list of Current Certificates.

Certificate Details

Both Certificate Requests and validated Certificates appear in the list of Current Certificates. The Certificate Details section lists the same information as the CA Certificate Details section, but a Status entry now appears in the details. If a certificate is valid and ready to be used with a VPN Security Association, the Status is Verified. If the certificate is not signed by the CA, the Status is Request Generated. You can also import the corresponding Signed Certificate in this section. Additionally, Certificate Signing Requests can be exported and deleted in the Certificate Details section of a Request Generated certificate.

Certificate Revocation List (CRL)

A Certificate Revocation List (CRL) is a way to check the validity of an existing certificate. A certificate may be invalid for several reasons:

It is no longer needed.

A certificate was stolen or compromised.

A new certificate was issued that takes precedence over the old certificate.

If a certificate is invalid, the CA may publish the certificate on a Certificate Revocation List at a given interval, or on an online server in a X.509 v3 database using Online Certificate Status Protocol (OCSP). Consult your CA provider for specific details on locating a CRL file or URL.

Tip The SonicWALL supports obtaining the CRL via HTTP or manually downloading the list.

You can import the CRL by locating the URL and then importing it into the SonicWALL. Certificates are checked against the CRL by the SonicWALL for validity when they are used.

You can also enter a URL location of the CRL by entering the address in the Enter CRL’s location for this CA (URL) field. The CRL is downloaded automatically at intervals determined by the CA service.

Page 218 SonicWALL Internet Security Appliance Administrator’s Guide

Page 217
Image 217
SonicWALL Internet Security Appliances manual Importing Certificate with private key, Certificate Revocation List CRL

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.