Creating a Certificate Signing Request

To create a certificate for use with a VPN SA, follow these steps:

Tip! You should create a Certificate Policy to used in conjunction with local certificates. A Certificate Policy determines the authentication requirements and the authority limits required for the validation of a certificate.

1.Click VPN, then Local Certificates.

2.In the Generate Certificate Signing Request section, enter a name for the certificate in the Certificate Name field. Using the drop down menus, enter information for the certificate request. As you enter information in the Request fields, the Distinguished Name (DN) is created. You may also attach an optional Subject Alternative Name to the certificate such as the Domain Name or E-mail Address.

3.The Subject Key type is preset as an RSA algorithm. RSA is a public key cryptographic algorithm used for encrypting data.

4.Select a Subject Key size from the from the Subject Key Size menu.

5.Not all key sizes are supported by a Certificate Authority, therefore you should check with your Certificate Authority for supported key sizes.

6.Click Generate to create a certificate file.

7.Once the Certificate Signing Request is generated, a message describing the result is displayed.

8.Click Export to download the file to your computer, and then click Save to save it to a directory on your computer.

9.Now that you have generated the Certificate Request, you can send it to your CA service for validation.

Importing a Signed Local Certificate

When the CA service returns the signed certificate request generated locally, import it into the SonicWALL using the following steps:

1.In the Current Certificates section of Local Certificates, select the corresponding request from the Certificates menu.

2.Click Browse, and select the *.der from the Choose File dialogue box.

3.Click Import Certificate.

4.The certificate is now updated to Verified, and you can now use it for a VPN SA using a third party certificate.

SonicWALL VPN Page 219

Page 218
Image 218
SonicWALL Internet Security Appliances manual Creating a Certificate Signing Request, Importing a Signed Local Certificate

Internet Security Appliances specifications

SonicWALL Internet Security Appliances are pivotal solutions aimed at safeguarding networks from an ever-evolving array of cyber threats. Designed for small to medium-sized businesses, as well as enterprises, these appliances deliver robust security and high-performance capabilities.

One of the main features of SonicWALL Internet Security Appliances is their Unified Threat Management (UTM) functionality. This integrated approach allows organizations to manage multiple security measures, including firewall protection, intrusion prevention systems (IPS), and antivirus capabilities, within a single device. This consolidation simplifies security management and reduces the risk of vulnerabilities from disparate systems.

Another significant technology found in these appliances is Application Control. This feature enables administrators to monitor and regulate the applications and services used within their networks, ensuring that bandwidth is allocated efficiently, and potentially harmful applications are blocked. Coupled with Content Filtering, SonicWALL offers granular policies to restrict access to inappropriate or non-work-related content, enhancing overall productivity while maintaining security.

SonicWALL appliances also utilize advanced cybersecurity technologies like SonicWall Capture Threat Assessment and Capture Advanced Threat Protection. These solutions leverage artificial intelligence to identify and remove sophisticated malware and ransomware threats before they infiltrate the network. This proactive approach ensures that only safe email and web traffic is allowed through, providing comprehensive protection against advanced persistent threats.

Moreover, SonicWALL’s Global Management System (GMS) enables centralized control over multiple security devices, making it easy for IT teams to maintain a consistent security posture across various locations. This capability is especially beneficial for organizations with distributed networks, as it provides real-time visibility into network activity and security incidents.

The appliances are also designed with scalability in mind. Whether an organization grows or needs to adjust its security policies, SonicWALL appliances can be updated, expanded, or modified without significant disruptions. This flexibility makes them a long-term investment for any business focused on network security.

In addition, SonicWALL's user-friendly interface simplifies the deployment and management processes. With intuitive dashboards and reporting tools, administrators can easily track security events, analyze network traffic patterns, and respond swiftly to potential threats.

In summary, SonicWALL Internet Security Appliances combine essential features like Unified Threat Management, Application Control, and advanced threat protection technologies into a cohesive security solution. Their scalability, centralized management capabilities, and user-friendly interfaces make them an excellent choice for businesses aiming to strengthen their cyber defenses in a complex digital landscape.