
Chapter 4: Configuring the High-Level Network
4-102
To specify invalid protocol versions using the Configuration
utility
1. In the navigation pane, click Proxies.
2. Click the Add button.
3. In the Client-side Connections Do Not Use These SSL Versions
box or the Server-side Connections Do Not Use These SSL
Versions box, check the appropriate check boxes.
4. Click Done.
To specify invalid SSL protocol versions from the command
line
Use the following syntax:
b proxy <ip>:<service> [clientssl] invalid [SSLv2] [SSLv3] [TLSv1]
b proxy <ip>:<service> serverssl invalid [SSLv2] [SSLv3] [TLSv1]
Specifying a list of trusted Certificate Authorities (CAs)
For both client-side and server-side SSL connections, you can specify
trusted certificate authorities (CAs). The proxy can then use this CA
specification to do the following:
• Build certificate chains
• Verify client certificates
• Advertise to clients the CAs that the server trusts
The following sections describe each of these uses of the trusted CAs list.
Building a certificate chain
Sometimes, a certificate that the SSL proxy uses to authenticate itself to a
peer is signed by an intermediate CA that is not trusted by that peer. In this
case, the proxy might need to build a certificate chain. The proxy allows you
to build a certificate chain by specifying the name of a specific certificate
chain file, either through the Configuration utility or from the command
line. Note that the certificate files that make up the chain file must be in
PEM format.
When attempting to access the specified chain file, the SSL proxy searches
for the file in the following manner:
1. The proxy looks to see that the specified file has a .chain extension.
2. If the file specification does not include a .chain extension, the
proxy appends that extension to the file and then searches for the
file.
3. If the file is not found, the proxy instead appends a .crt extension to
the file and searches again.
Komentarze do niniejszej Instrukcji