Gateway certificates are used for authentification in VPN and WiFi networks on MG devices.
The following workflows are available for creating and managing gateway certificates on MG devices:
Use the MG device’s LCI to create a certificate profile, generate a certificate signing request (CSR), and upload signed certificates. Performing these operations via the LCI is known as Out-of-band(OOB). For more information, see Managing of Out-of-band(OOB) Changes.
Use the Certificate Management Specification building block (introduced in AMM 2.17) in a configuration template, to bulk transfer one or more CSRs and signed certificate(s) from/to gateways. For more information about this, see Certificate Management Workflow
Use the Server File building block (introduced in AMM 2.17) in a configuration template to upload Root CA and Server Certificates to gateways via the AMM. For more information about this, see Uploading Root CA and Server Certificates
Overview of the Gateway Certificate Management Screen
The Gateway Certificate Management screen, accessed by navigating to Configuration > Gateway Certificates, is the main screen in which you manage certificate profiles, and invoke certificate management operations. The following figure shows the main elements of this screen:
Gateway Compatibility
The certificate management functionality is supported for the following platforms and software versions:
Note: ALEOS and oMG-2000 gateways continue to use ACEmanager and the LCI to upload signed certificates and private keys to gateways.
Managing of Out-of-band (OOB) Changes
A gateway’s LCI can be used to directly upload signed certificates and private keys, as well as delete certificate profiles and generate CSRs. Performing these operations via the LCI is said to be out-of-band or OOB, meaning the operations are done without the use of the AMM’s certificate management facilities.
When an OOB change is made, the gateway will notify the AMM. The AMM will then fetch the certificate from the gateway, extract its expiry day, and update the Cert Expire Date column on the Gateway Certificate Management screen.
For more information about how to do Out-of-band certificate changes, see the MG device’s user guide.
Certificate Management Workflow
Note: after a certificate profile has been created and deployed to a gateway, the AMM tells the gateway to generate a CSR. At that time, the gateway will generate the private key and hide it. The CSR and signed certificate both contain the public part of the key.
Note: you can use the certificate profile to set up IPsec tunnels and Wi-Fi networks.
Creating and Deploying Certificate Profiles
Before you can use the Certificate Management functionality with gateways, you must first create and deploy a certificate profile to those gateways using the Configure Templates wizard:
1. Navigate to Configuration > Templates. For additional information see Configuration Templates.
2. Click Add. The Create Configuration Template popup appears:
3. Set the Platform to MG90 and the Target version to 4.3.x or higher , and click Next .
4. Expand the Advanced node in the building block tree:
5. Add the Certificate Management Specification building block and click Next .
6. Enter a Template Name in the General section:
7. Click the + button to add a Certificate Profile in the Certificate Management Specification section, and populate the certificate details . For information on selecting the correct algorithm, see: How to Select the Correct Key Algorithm in the Certificate Management Specification Building Block.
8. Click Submit . The wizard closes and the AMM returns back to the Configuration Templates screen.
9. Publish the template.
10. Select the target gateways in the Gateway tree, and deploy the template to those gateways.
There are three ways in which a CSR can be generated:
When it comes time to renew the certificate, follow the steps below to generate a new CSR for download on a gateway:
1. Navigate to Configuration > Gateway Certificates.
2. Select the gateway(s) that should generate a CSR :
3. Make a note of which certificate profile should provide the information to use when generating the CSR . Note: the list of gateways shown is based on which gateways or groups of gateways are selected in the Gateway tree and those which have had a configuration profile assigned to them.
4. Click Generate CSR to display the Generate CSR popup.
5. Set the Profile to the certificate profile identified in step 3.
6. Click Generate . The popup will close and the CSR Status field on the Gateway Certificate Management screen will change to Generating.
7. Wait until the CSR status changes to Ready :
Note: the transition from Generating to Ready depends on the gateway’s online status. For example, if a gateway is powered off at the end of the current working day, then the CSR won’t be ready until the next working day when the gateway is switched on.
The CSR file(s) can now be downloaded.
Downloading CSRs from Gateways
After a CSR has been generated on a gateway, you can download it and send it to your certificate authority for signing:
1. Navigate to Configuration > Gateway Certificates.
2. Select the gateway from which the CSR should be downloaded. The certificate profiles on that gateway are listed in the Cert Profile Name column on the Gateway Certificate Management screen, along with their statuses in the CSR Status column :
3. Make a note of which certificate profile corresponds to the CSR that you want to download :
4. Click Download CSR . The Download CSR popup appears:
5. Set Profile to the certificate profile containing the CSR that you identified in step 3. Note that a CSR can be in the following states:
Depending on the state of the CSR, the popup message may be one of the following :
Note: If there are no CSRs available for the selected certificate profile, the popup will display the message No CSR available to download for profile ECDSA_K512 from your selected gateways and the Download button will be disabled.
7. Click Download . A .zip file is downloaded to your local machine containing the CSR file(s) that you will send to your certificate authority. Note that if you selected a group or multiple gateways in the Gateway Tree, then the zip file will contain multiple CSRs.
Note: browser popups must be enabled in your web browser for the download to work.
8. Unzip the downloaded file and send the CSR to your certificate authority.
Uploading Gateway Certificates
After you have received your signed certificates from your certificate authority, you can upload them to the gateway(s) via the AMM:
If the contents of the certificate(s) in the .zip package are incorrect, the following message will be displayed: The following uploaded certificate files failed to be distributed. The AMM will also notify you if there are abnormalities found between the signed certificate and the gateway’s certificate profile (e.g., no match found, bad validation or expiry dates, unrecognized file format, etc.).
Note: the AMM only keeps one CSR and one certificate for each certificate profile. The latest pair that were uploaded via the AMM or gateway’s LCI will overwrite the previous one.
Modifying any fields of an existing certificate profile (which is accomplished via a Configuration Template) will invalidate the CSR and certificate in the profile. Therefore, a new CSR must be generated and sent to the certificate authority; the signed certificate received back from the authority must then be uploaded to the gateway.
Uploading Root CA and Server Certificates
You can upload the following additional types of certificates for a VPN IPsec tunnel or Wi-Fi network using the Server Certificates building block:
Note: Since gateways have limited storage space and CPU power, they should only be using a few root certificates (with the provision to use self-signed certificates) to validate a connecting peer, and should not use the standard CA-certificate bundle maintained by Mozilla which contains over 3000 root certificates. If provided with a CA certificate, a gateway will use the CA cert to validate an IPSec tunnel peer (i.e., an ACM), and/or a Wi-Fi EAP TLS server for Wi-Fi networks.
Follow the steps below to upload a root CA or server certificate for a VPN IPsec tunnel. Note that the steps to upload a root CA or server certificate for a Wi-Fi network will be similar.
1. Navigate to Configuration > Templates. For additional information see Configuration Templates.
2. Click Add. The Create Configuration Template popup appears.
3. Set the Platform to MG90 and the Target version to 4.3.x or higher, and click Next .
4. Expand the Advanced node in the building block tree.
5. Add the Server Certificates and VPN Specification building blocks and click Next.
6. Click the + button in the Server Certificates building block to display the Upload popup:
7. Click Select Files in the Upload popup to select the certificate:
8. Click the + button for VPN Profiles in the VPN Settings building block:
9. Set Type to IPsec.
10. Click the + button in the Authentication section of the VPN Settings building block:
11. Set Authentication Method to Certificate.
12. Enable CA Certificate File or Server Certificate File in the Certificate Settings section. The name of the certificate file uploaded in step 6 will appear for selection.
13. Enable and populate the Certificate Profile Name .
14. Click Submit. The wizard closes and the AMM returns back to the Configuration Templates screen.
15. Publish the template.
16. Select the target gateways in the Gateway tree, and deploy the template to those gateways.
Notes:
- The uploaded CA certificate file belongs to the template that contains the Server Certificates building block through which the file was uploaded. The uploaded certificate cannot be used by other templates.
- Only Wi-Fi networks and VPNs can use a CA certificate file, therefore you must include the Server Certificates building block if you want to deploy a CA certificate.
- Templates that do not have a Wi-Fi Network or VPN IPsec building block must not include the Server Certificates building block.
Depending on which certificate management operation is being performed, a certificate profile’s CSR status (indicated in the CSR Status column on the Gateway Certificate Management screen) can be in one of the following states:
Summary of Certificate Statuses
When a signed certificate is been deployed to a gateway, a certificate profile’s certificate status (indicated in the Cert Status column on the Gateway Certificate Management screen) will be in one of the following states: