Cisco Cisco Web Security Appliance S690 User Guide

Page of 446
 
10-8
AsyncOS 8.5 for Cisco Web Security Appliances User Guide
 
Chapter 10      Create Decryption Policies to Control HTTPS Traffic
  Certificates
Step 8
(Optional) Click Download Certificate so you can transfer it to the client applications on the network.
Generating a Certificate and Key
Before you begin
Enable the HTTPS Proxy. 
Step 1
Security Services > HTTPS Proxy.
Step 2
Click Edit Settings.
Step 3
Select Use Generated Certificate and Key.
Step 4
Click Generate New Certificate and Key.
Step 5
In the Generate Certificate and Key dialog box, enter the information to display in the root certificate. 
You can enter any ASCII character except the forward slash ( / ) in the Common Name field.
Step 6
Click Generate
Step 7
The generated certificate information is displayed on the Edit HTTPS Proxy Settings page.
Step 8
(Optional) Click Download Certificate so you can transfer it to the client applications on the network.
Step 9
(Optional) Click the Download Certificate Signing Request link. so you can submit the Certificate 
Signing Request (CSR) to a certificate authority (CA). 
Step 10
(Optional) Upload the signed certificate to the Web Security appliance after receiving it back from the 
CA. You can do this at anytime after generating the certificate on the appliance. 
Step 11
Submit and Commit Changes.
Configuring Invalid Certificate Handling
Before you begin
Verify that the HTTPS proxy is enabled as described in 
Step 1
Security Services > HTTPS Proxy.
Step 2
Click Edit Settings.