Manage Appliance Certificates Window


The Manage Appliance Certificates window provides a central location for managing the security certificates for your Extreme Access Control (Access Control) engines. You can access this window by right-clicking on any engine in the right-panel Appliances tab.

  NOTE: Extreme Management Center automatically generates alarms as the Access Control Engine Internal Communications Server Certificate, the Captive Server Portal Server Certificate, the RADIUS Server Certificate, the AAA Configuration Truststore, and the Access Control Engine Truststore approach their expiration date. Extreme Management Center generates a Notification alarm 30 days before expiring, a Warning alarm 7 days before expiring, and a Critical alarm when the certificate expires.

The top section of the window lets you modify the engine's security certificates. During installation, server certificates are generated for each Access Control engine. While these certificates provide secure communication, there may be cases where you want to update to a certificate provided from an external certificate authority, or add certificates in order to meet the requirements of external components with which NAC Manager must communicate. Additionally, you may want to use a "browser-friendly" certificate so that users don't see browser certificate warnings when they access web pages. You can use this section to:

  • View and update the Captive Portal server certificate
  • View and update the Internal Communications server certificate
  • View and update the certificate configuration for agent-based assessment
  • View and update the RADIUS server certificate

The bottom section of the window provides information about the AAA configuration used by the engine group to which the engine belongs. You can use this section to:

  • View the configured AAA authentication behavior to determine whether certificates are used in the authentication process. If your Access Control deployment is using EAP-TLS, PEAP, or EAP-TTLS authentication and the authentication requests are not proxied, certificates are used to provide secure communication between the Access Control RADIUS server and end-systems that are authenticating. However, if your authentication behavior is configured to proxy all 802.1X authentication requests, then certificates are not used.
  • View and update the AAA certificate authorities that are trusted to issue client certificates for 802.1X authentication. You only need to do this if your AAA authentication behavior uses certificates.

Any changes made in this window do not take effect until the engine is enforced.

Click areas in the window for more information.

Captive Portal Server Certificate Internal Communications Server Certificate Agent-Based Assessment Server Certificate RADIUS Server Certificate AAA Configuration AAA Trusted Certificate Authorities AAA Configuration section Appliance Section Manage Appliance Certificates Window

Appliance

Use this section to view the current configuration for the engine server certificates, and update the certificates, if desired. For complete instructions on replacing and verifying a certificate, see How to Update Access Control Engine Server Certificates.

Captive Portal Server Certificate
The  Captive Portal server certificate provides secure communication for the Access Control captive portal web pages. Click Update Certificate to open the Update Captive Portal Server Certificate window where you can replace the certificate.
Internal Communications Server Certificate
The Internal Communications server certificate provides secure communication between components and for Access Control administrative web pages. Click Update Certificate to open the Update Internal Communications Server Certificate window where you can replace the certificate.
Agent-Based Assessment Server Certificate
The server certificate for agent-based assessment provides secure agent communications. Use the button to toggle between the following two selections:
  • Use Legacy Certificate - This option causes agent-based assessment to use the legacy (NAC Manager version 4.0.0 and earlier) server certificate in order to provide backward compatibility with older agents.
  • Use Internal Certificate - Once agents have been upgraded, this option uses the Internal Communications server certificate for agent communications. Using the Internal Communications server certificate provides increased security and also allows you to update the certificate, if desired.
Any change takes effect when the engine is enforced. When enforced, the agent communications port (8443) is offline for 15 seconds to reload the certificate.
RADIUS Server Certificate
The RADIUS server certificate is the certificate sent to end-systems during certain forms of 802.1X authentication (EAP-TLS, PEAP, and EAP-TTLS). Click Update Certificate to open the Update RADIUS Server Certificate window where you can update to a certificate generated by a Certificate Authority that your connecting end-systems are already configured to trust.
 NOTE:The current configuration displays "No certificate information is available" if you have not updated the RADIUS server certificate using this window, even though a certificate is generated during installation.

AAA Configuration

If your Access Control deployment is using EAP-TLS, PEAP, or EAP-TTLS authentication and the authentication requests are not proxied, you need to update your RADIUS server certificate to a CA certificate your connecting end-systems trust. In addition, you need to configure the AAA Trusted Certificate Authorities to designate which client certificates can be trusted.

This information is part of the AAA configuration and shared across all engines in an engine group. This allows end-systems to be trusted on any Access Control engine where they can authenticate.

AAA Configuration
This section displays the current authentication behavior configured for the engine and helps you determine whether certificates may be used during authentication. If the engine RADIUS server proxies all 802.1X authentication requests, then certificates are not used. If the engine RADIUS server can terminate 802.1X authentication requests, then certificates are used if you are using EAP-TLS, PEAP, or EAP-TTLS authentication. Use the Edit AAA Configuration button to access your AAA configuration to change this behavior. 
AAA Trusted Certificate Authorities
Click Update Certificates to open the Update AAA Trusted Certificate Authorities window where you can create a list of trusted certificate authorities (CAs) to issue client certificates for 802.1X authentication, as well as create a list of CRL distribution points which are used to check for revoked client certificates. Changing this configuration affects all engines that use the AAA configuration.

For information on related tasks:

Top