
Clusters
chain. The default of 2 indicates that the client certificate (level 0) and two
levels above it (levels 1 and 2) are checked; any certificates above level 2
in the chain are ignored. You should only need to increase this value if the
Certificate Authority that issued your certificate provided you with more
than 2 chained certificates in addition to your client certificate.
Flags
Push Client Certificate
Enabling this option sends the entire client certificate to the back-end
server. This allows the server to confirm that the client connection is
authenticated without having to do a complete SSL renegotiation.
Require Client Certificate Enabling this option requires that clients present certificates.
Strict CRL Chain
Enabling this option checks the validity of all certificates in a certificate
chain against the CRL associated with the cluster. If any of the certificates
in the chain cannot be validated, return an error. If this option is disabled
(the default), only the last certificate in the chain is checked for validity.
Layer 7 Security SSL Screen (HTTPS Clusters only)
The Layer 7 Security SSL screen shown below is displayed when an HTTPS cluster is selected from the Cluster
branch on the left frame Configuration tree on the GUI.The Security > SSL tab allows you to configure various
options that are specific to HTTPS connections.
Ciper Suites
Lists the supported cipher suites for incoming HTTPS requests. If a client
request comes into Equalizer that does not use a cipher in this list, the
connection is refused.
Allow SSLv2 Enables SSLv2 for client connections.
298
Copyright © 2013 Coyote Point Systems. A subsidiary of Fortinet, Inc.
Comentarios a estos manuales