TLS Encryption Transcript
TLS Encryption Transcript
Welcome back to the Threat Protection Level 2 course. In this lesson we’ll use TLS Encryption to
help Acme Corp communicate securely with a new business partner.
Acme Corp wishes to start doing business with an industry giant called MegaBank. Policies that
are in place require that all email communication with MegaBank take place over an encrypted
connection.
Cooper has been tasked with setting this up. First, he’ll need to generate a Certificate Signing
Request and submit it to a Certificate Authority. Once he gets the certificate back, he’ll need to
import it into the Protection Server. Finally, he’ll need to configure the Protection Server to use
this certificate to create a secure and encrypted connection with MegaBank.
To generate a Certificate Signing Request, navigate to the System tab. Then the System section.
Then expand Certificates and click Certificates.
When the page refreshes, click the Generate Certificate Request button.
On the pop-up that appears, fill out the form with your organization’s data and click Request
Certificate.
Once your Certificate Request has been generated, copy the text in the field and send it to your
certificate authority.
Once you have received your signed certificate back from the certificate authority, you can
import it into the Protection Server.
On the Import Certificate pop-up that appears, click the Browse button to locate the certificate
file on your local machine.
Once your signed certificate is imported, it will appear in the list of installed certificates.
To use the newly imported certificate for SMTP connections, navigate to the Services sub-menu
of Certificates.
Click on the drop-down for the SMTP Server. And select the newly installed certificate, in place
of the default, self-signed certificate.
To enable encryption for the trusted partner domain, navigate to the SMTP Encryption menu,
which is also under the System section.
On the settings page, we’ll enable TLS. Set the minimum cipher for configured domains to a
128-bit key. Request client certificates. And enable the sending of our local client certificate.
We'll set the minimum protocol versions to values considered to be best practice for inbound
and outbound messages.
The last step is to configure the partner’s domain. Navigate to the TLS Domains sub-menu,
under SMTP Encryption. Then click the Add button.
The encrypted connection has been set up and is working fine. Several months go by without
any problems. Today, however, Cooper is notified that Acme users are no longer able to send
messages to MegaBank. When he troubleshoots this, he finds that the MegaBank certificate has
expired.
MegaBank confirms Cooper’s findings and gets to work right away renewing their certificate. In
the meantime, management confirms that turning off encryption in order to keep business
operations flowing is not an option. The traffic must be encrypted. They decide that using the
expired MegaBank certificate to encrypt the traffic is an acceptable temporary solution while
MegaBank gets their certificate renewed.
To do this navigate back to the TLS Domains sub-menu under System/SMTP Encryption.
On the pop-up that appears, select the Off toggle for the Require Valid Certificate setting. Then
click Save Changes.
This will allow encrypted connections to occur while Mega Bank resolves their certificate
renewal issues.
And that worked. Secure connections with MegaBank have resumed. When the certificate is
renewed, Cooper can simply toggle the setting back to on.
Be sure to join us for the next lesson, and thanks for watching!