Cisco Cisco Web Security Appliance S360 Guía Del Usuario

Descargar
Página de 286
7-10
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
 
Chapter 7      Create Decryption Policies to Control HTTPS Traffic
  Root Certificates
The uploaded certificate information is displayed on the Edit HTTPS Proxy Settings page.
Step 8
(Optional) Click Download Certificate so you can transfer it to the client applications on the network.
Generating a Certificate and Key for the HTTPS Proxy
Before You Begin
Enable the HTTPS Proxy. 
.
Step 1
Security Services > HTTPS Proxy.
Step 2
Click Edit Settings.
Step 3
Select Use Generated Certificate and Key.
Step 4
Click Generate New Certificate and Key.
Step 5
In the Generate Certificate and Key dialog box, enter the information to display in the root certificate. 
You can enter any ASCII character except the forward slash ( / ) in the Common Name field.
Step 6
Click Generate
Step 7
The generated certificate information is displayed on the Edit HTTPS Proxy Settings page.
Step 8
(Optional) Click Download Certificate so you can transfer it to the client applications on the network.
Step 9
(Optional) Click the Download Certificate Signing Request link. so you can submit the Certificate 
Signing Request (CSR) to a certificate authority (CA). 
Step 10
(Optional) Upload the signed certificate to the Web Security appliance after receiving it back from the 
CA. You can do this at anytime after generating the certificate on the appliance. 
Step 11
Submit and Commit Changes.
Configuring Invalid Certificate Handling
Before You Begin
Verify that the HTTPS proxy is enabled as described in 
Step 1
Security Services > HTTPS Proxy.
Step 2
Click Edit Settings.