Your Firebox can use certificates for several purposes:
- Management session data is secured with a certificate.
- Branch Office VPN, Mobile VPN with IPSec, and Mobile VPN with L2TP tunnels can use certificates for authentication.
- When content inspection is enabled for HTTPS traffic or SMTP over TLS, these proxies use a certificate to re-encrypt incoming traffic after it is decrypted for inspection.
- You can use a certificate with the proxy to protect a web server on your network.
- When a user authenticates with the Firebox for any purpose, such as a WebBlocker override, the connection is secured with a certificate.
- When RADIUS or Firebox authentication is configured to use WPA Enterprise or WPA2 Enterprise authentication methods.
By default, your Firebox creates self-signed certificates to secure management session data and authentication attempts for Fireware Web UI and for proxy content inspection.
For more information, see:
- Manage Device Certificates (Web UI)
- Manage Device Certificates (WSM)
- Create a Certificate with FSM or the Management Server
- Create a CSR with OpenSSL
- Import a Certificate on a Client Device
- Use Certificates with HTTPS Proxy Content Inspection
- Certificate Portal
- SMTP-Proxy: TLS Encryption
- Certificates for Branch Office VPN (BOVPN) Tunnel Authentication
- Certificates for Mobile VPN With IPSec Tunnel Authentication
- Certificates for Mobile VPN with IPSec Tunnel Authentication
- Manage Certificates on the Management Server