ESA Wildcard CA Usage Template
ESA Wildcard CA Usage Template
Functional Overview
Network/Security administrators in CBE might desire to use a wildcard certificate on the ESA
appliance for any of the following reasons:
o In order to encrypt the SMTP conversations with other MTAs that use TLS (both inbound and
outbound conversations).
o In order to enable the HTTPS service on the appliance for access to the GUI via HTTPS.
o For use as a client certificate for Lightweight Directory Access Protocols (LDAPs), if the LDAP server
requires a client certificate.
o In order to allow secure communication between the appliance and the Rivest-Shamir-Addleman
(RSA) Enterprise Manager for Data Loss Protection (DLP).
o In order to allow secure communication between the appliance and a Cisco Advanced Malware
Protection (AMP) Threat Grid Appliance.
o Finally, wildcard CA is better than self-signed CA because of its verifiability
Requirements and Steps
The following process will help with SSL certificate installation/update on Cisco IronPort Email
Security Appliance (ESA).
Components
i. Cisco IronPort Email Security Appliance (ESA): Current Version used in CBE
ii. Cisco IronPort Security Management Appliance (SMA): Current Version used in CBE
1. ESA
In most cases wildcard certificate is used for TLS/SSL services on ESA. Certificate file needs to be in a
PKCS#12 format, be secured with password and contain the certificate and private key. If you do not have
certificate and private key to import you will need to create the Certificate Signing Request (CSR):
Note: CBE has already received a Privacy Enhanced Email (PEM) signed certificate from
DigiCert.
Use this guideline in CBE
Once you have installed the signed certificate, you must reconfigure the TLS/SSL services on the
appliance to use it. The following instructions will cover all necessary configuration steps:
2. SMA
o Download a copy of the configuration file from ESA appliance where the certificate was
generated. Make sure not to mask passwords as it will hide private key information
o Open the configuration file in a text-based editor (Notepad++)
o Copy certificate and private key. Private key will begin with —–BEGIN RSA PRIVATE KEY—– and
end with —–END RSA PRIVATE KEY—– and certificate will begin with —–BEGIN CERTIFICATE—–
and will end with —–END CERTIFICATE—–.
Verification
For a verifiable inbound connection, validate that these three items match:
o MX record (Domain Name System (DNS) hostname)
o Common Name
o Interface hostname