Managing Certificates and CA Certificates

When accelerating encrypted traffic, the Exinda appliance transparently decrypts the traffic, performs the relevant application acceleration techniques, such as TCPTransmission Control Protocol Acceleration, WANWide Area Network Memory, or Edge Cache caching, and then re-encrypts the traffic. The Exinda appliances must have access to the appropriate certificates or certificate authority (CA) certificates, and the public keys to decrypt and re-encrypt the traffic. You can import a certificate or a CA certificate, or generate a self-signed certificate or CA certificate.

On the Certificates tab, you can import normal certificates and you can generate untrusted self-signed certificates. Note that the normal certificates may be trusted Certificate Authority (CA)-signed certificates or self-signed certificates. In the Certificates and Keys table, you can see a list of all the (non-CA) certificates available on the appliance. You can show, delete, or export any of these certificates.

On the CA Certificates tab, you an import CA certificates and you can generate untrusted self-signed CA certificates. By importing CA certificates, the appliance can offer the entire chain of trust to clients when performing an SSL handshake. In the CA Certificates and Keys table, you can see a list of all the CA certificates available on the appliance. You can show, delete, or export any of these certificates.

NOTE

Certificates and keys are stored securely on the Exinda appliance. It is not possible to export or view the private key once it has been imported. If you lose the configuration or need to migrate the configuration to another appliance, you must manually load the private key again.

NOTE

The interface for importing both Certificates and CA Certificates is the same.

NOTE

The interface for generating both Certificates and CA Certificates is the same.

List of CA Certificates and Keys (the list is similar on the Certificates tab for Certificates and Keys)