
push_client_cert
Send the entire client certificate to the back-end server. This allows
the server to confirm that the client connection is authenticated
without having to do a complete SSL renegotiation.
require_client_cert
Require that clients present certificates.
software_ssl_only
When disabled (the default), an HTTPS cluster performs
hardware SSL acceleration using the version of OpenSSL
supported in previous releases.
When enabled, an HTTPS cluster uses the updated
version of OpenSSL (1.0.1e). This option applies only to
E450GX and E650GX model Equalizers.
allow_tls10
Enables and disables TLS / SSL protocol versions in the
updated OpenSSL 1.0.1e. When enabled, If TLS 1.0. is
checked, only TLS 1.0. will be used. The other version
will be ignored.
allow_tls11
This option is disabled, by default. It enables and
disables TLS / SSL protocol versions in the updated
OpenSSL 1.0.1e. When enabled, If TLS 1.1. is checked,
only TLS 1.1. will be used. The other version will be
ignored. The software_ssl_only flag must be enabled
for this option to be selected and is therefore only
applicable to E450GX and E650GX model Equalizers.
rewrite_redirects
When enabled, forces Equalizer to pass responses from
an HTTPS cluster’s servers without rewriting them. In the
typical Equalizer setup, you configure servers in an
HTTPS cluster to listen and respond using HTTP;
Equalizer communicates with the clients using SSL. If a
server sends an HTTP redirect using the Location:
header, this URL most likely will not include the https:
protocol. Equalizer rewrites responses from the server so
that they are HTTPS. You can direct Equalizer to pass
responses from the server without rewriting them by
enabling this option.
ignore_critical_extns
Control whether Equalizer will process "CRL Distribution Point"
extensions in client certificates. This option onlyaffects the
processing of the "CRL Distribution Point" extension in client
certificates:
When Ignore Critical Extensions is disabled, a client certificate
presented to Equalizer that includes any extension will be rejected
by Equalizer. This is the behavior in previous releases.
When Ignore Critical Extensions is enabled (the default), a client
certificate presented to Equalizer that has a CRL Distribution Point
extension will be processed and the CRL criticalextension will be
ignored. Note, however, that if other extensions are present in a
client certificate they are not ignored and will cause the client
certificate to be rejected by Equalizer.
strict_crl_chain
Checkthe validity of allcertificates in a certificate chain against the
CRL associated with the cluster. If any of the certificates in the
chain cannot be validated, return an error. If this option is
disabled
Copyright © 2013 Coyote Point Systems. A subsidiary of Fortinet, Inc.
All Rights Reserved.
153
Equalizer Administration Guide
Comentarios a estos manuales