I'm getting ready to generate a CSR for an SSL Forward Proxy Cert and I wanted to know which IP address should I use for the Common Name. I would like to inspect SSL traffic that is sourced from both my Trusted zone as well as my DMZ zone.
1) Should I use the IP address associated with my Trusted zone?
2) If I use the IP address of my Trusted zone interface, will that cause hosts within my DMZ zone to throw an error with the certificate?
Solved! Go to Solution.
You can use any common name or IP address. Assume this common name as say verisign or Godaddy. For example, you gave a common name as "My Company" and user went to https://google.com, when a user looks at certificate, it will look like My Company has signed Google.com.
We just have to make sure that this cert is installed on Trusted Root Cert on client's machine. Unlike captive portal or Global Protect, common name is not of that importance. Hope this helps. Thank you.
Welcome to forums.
You can use any common name for the certificate just the requirement is that the CA that issued the certificate must be in the Trusted Cert Store.
There is need to install the certificate itself, just the CA which assigned that certificate.
If the certificate was self signed then you need to import the certificate.
Hope it helps !
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!