<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: I am trying to do the same in Web Security</title>
    <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/3373852#M7769</link>
    <description>&lt;P&gt;Any Update on this Topic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on our case, web traffic managed by WSA covers employees and visitors.. for employees, the Self-Signed Certificate works fine and has been applied, via GPO, distributing certificates to extensions under MSFT AD. However, visitors are receiving the "invalid certificate message". Any tip on it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've been trying to generate a public SSL certificate using GoDaddy, and, no success. However, we're still trying to find a solution that visitors, using company WebAccess, can access HTTPS pages without receiving disturbing messages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any update? Any idea? take care and thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 26 Apr 2018 15:11:32 GMT</pubDate>
    <dc:creator>rps.soares</dc:creator>
    <dc:date>2018-04-26T15:11:32Z</dc:date>
    <item>
      <title>2048 bit key for IronPort WSA for HTTPS proxy</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243212#M3482</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was recently provided with the following information below. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"The feature request (ID) referenced is for the WSA generated certificates. Currently the certs generated are 1024 bits and the ability to generate 2048 bit certs has been requested.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;If a 2048 bit root cert from a Local CA is created, it can be uploaded along with the private key via the ‘Use Uploaded Certificate and Key’ option.”&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;So we DO Support installing 2048 bit certificates generated by another source&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;Note: It has been reported that 2048 bit certs can degrade the WSA performance&amp;nbsp; by up to 75% in 7.5."&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt; &lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Looking for anyone who has successfully done this and to please provide me with pointers. If the WSA does not generate the CSR, how can I bind the certificate afterward?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Sun, 28 Apr 2013 16:39:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243212#M3482</guid>
      <dc:creator>ccsipaul01</dc:creator>
      <dc:date>2013-04-28T16:39:55Z</dc:date>
    </item>
    <item>
      <title>2048 bit key for IronPort WSA for HTTPS proxy</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243213#M3483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Paul, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Get OpenSSL from SourceForge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This will generate a new key and the CSR (you'll be prompted for the various fields...)&lt;/P&gt;&lt;P&gt;openssl req -new -newkey rsa:2048 -nodes -keyout yourdomain.key -out yourdomain.csr&lt;/P&gt;&lt;P&gt;(or use the command line generated with this tool &lt;A href="https://www.ssl247.com/support/tools/openssl-csr-wizard"&gt;https://www.ssl247.com/support/tools/openssl-csr-wizard&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That will create 2 files, the CSR file and the KEY.&amp;nbsp; &lt;/P&gt;&lt;P&gt;Send the CSR in, get your cert...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You'll need to decrypt the key before you can upload it to the WSA. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; openssl rsa -in privatekey-encrypted.key -out private.key&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;Upload the cert and the key, and you're set... &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;You could also use IIS to generate the CSR, import the cert as you normally would, then export the cert as a Pfx file.&amp;nbsp; Then you'd have to use OpenSSL to pull it apart: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;openssl pkcs12 -in &lt;FILENAME.PFX&gt; -nocerts -out privatekey-encrypted.key &lt;/FILENAME.PFX&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;You will be prompted for "Enter Import Password". This is the password created in step 11 above.&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;You will also be prompted for "Enter PEM pass phrase". The is the encryption password (used below).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;This will create the encrypted private key file named "privatekey-encrypted.key"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;To create a decrypted version of this key, use the following command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt;"&gt;openssl rsa -in privatekey-encrypted.key -out private.key&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 15:06:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243213#M3483</guid>
      <dc:creator>Ken Stieers</dc:creator>
      <dc:date>2013-04-29T15:06:28Z</dc:date>
    </item>
    <item>
      <title>2048 bit key for IronPort WSA for HTTPS proxy</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243214#M3484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Ken,&lt;/P&gt;&lt;P&gt;Thank you for the detailed explanation. I will test this today or tomorrow.&lt;/P&gt;&lt;P&gt;Appreciate your timely reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Apr 2013 16:23:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243214#M3484</guid>
      <dc:creator>ccsipaul01</dc:creator>
      <dc:date>2013-04-29T16:23:13Z</dc:date>
    </item>
    <item>
      <title>2048 bit key for IronPort WSA for HTTPS proxy</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243215#M3485</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Ken&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just to let you know I have not yet tried this solution.&lt;/P&gt;&lt;P&gt;Should have time this week.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 May 2013 13:45:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243215#M3485</guid>
      <dc:creator>ccsipaul01</dc:creator>
      <dc:date>2013-05-13T13:45:40Z</dc:date>
    </item>
    <item>
      <title>2048 bit key for IronPort WSA for HTTPS proxy</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243216#M3486</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Ken, &lt;/P&gt;&lt;P&gt;I've got the same issue, but when I used the openssl command provided, I get this error when trying to upload the key and certificate:&lt;/P&gt;&lt;P&gt;Error&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;—&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Certificate upload failed. The certificate file appears to be a server certificate. A root signing certificate is required.&lt;/P&gt;&lt;TABLE width="550px"&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 20 Aug 2013 11:22:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243216#M3486</guid>
      <dc:creator>Erik Dahle</dc:creator>
      <dc:date>2013-08-20T11:22:17Z</dc:date>
    </item>
    <item>
      <title>Hi Paul</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243217#M3487</link>
      <description>&lt;P&gt;Hi Paul&lt;/P&gt;
&lt;P&gt;Little bit late for a response, but you could try the following commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="margin-bottom: 1.4em; padding: 0px; font-size: 14px; line-height: 19.600000381469727px;"&gt;Generate the key:&lt;/P&gt;

&lt;PRE class="code" style="padding: 0.7em 1em; font-family: Consolas, 'Andale Mono WT', 'Andale Mono', 'Bitstream Vera Sans Mono', 'Nimbus Mono L', Monaco, 'Courier New', monospace; font-size: 14px; border-top-left-radius: 2px; border-top-right-radius: 2px; border-bottom-right-radius: 2px; border-bottom-left-radius: 2px; margin-bottom: 1.4em; line-height: 19.600000381469727px; word-wrap: normal; background-color: rgb(251, 250, 249); border-color: rgb(204, 204, 204); direction: ltr; box-shadow: rgb(204, 204, 204) 0px 0px 0.5em inset; overflow: auto;"&gt;
openssl genrsa -des3 -out cakey.pem 2048&lt;/PRE&gt;

&lt;P style="margin-bottom: 1.4em; padding: 0px; font-size: 14px; line-height: 19.600000381469727px;"&gt;Generate the certificate (Valid for 10 Years):&lt;/P&gt;

&lt;PRE class="code" style="padding: 0.7em 1em; font-family: Consolas, 'Andale Mono WT', 'Andale Mono', 'Bitstream Vera Sans Mono', 'Nimbus Mono L', Monaco, 'Courier New', monospace; font-size: 14px; border-top-left-radius: 2px; border-top-right-radius: 2px; border-bottom-right-radius: 2px; border-bottom-left-radius: 2px; margin-bottom: 1.4em; line-height: 19.600000381469727px; word-wrap: normal; background-color: rgb(251, 250, 249); border-color: rgb(204, 204, 204); direction: ltr; box-shadow: rgb(204, 204, 204) 0px 0px 0.5em inset; overflow: auto;"&gt;
openssl req -new -x509 -extensions v3_ca -key cakey.pem -out cacert.pem -days 3650&lt;/PRE&gt;

&lt;P style="margin-bottom: 1.4em; padding: 0px; font-size: 14px; line-height: 19.600000381469727px;"&gt;Remove the passphrase from the key:&lt;/P&gt;

&lt;PRE class="code" style="padding: 0.7em 1em; font-family: Consolas, 'Andale Mono WT', 'Andale Mono', 'Bitstream Vera Sans Mono', 'Nimbus Mono L', Monaco, 'Courier New', monospace; font-size: 14px; border-top-left-radius: 2px; border-top-right-radius: 2px; border-bottom-right-radius: 2px; border-bottom-left-radius: 2px; margin-bottom: 1.4em; line-height: 19.600000381469727px; word-wrap: normal; background-color: rgb(251, 250, 249); border-color: rgb(204, 204, 204); direction: ltr; box-shadow: rgb(204, 204, 204) 0px 0px 0.5em inset; overflow: auto;"&gt;
openssl rsa -in cakey.pem -out cakey_nopass.pem&lt;/PRE&gt;

&lt;P dir="ltr"&gt;Later the certificate (cacert.pem) and key (cakey_nopass.pem) may be imported on the WSA.&lt;/P&gt;
&lt;P dir="ltr"&gt;Still, be aware about the performance impact caused by 2048bit certificate.&amp;nbsp;&lt;/P&gt;
&lt;P dir="ltr"&gt;BR,&lt;BR /&gt;Artur&lt;/P&gt;</description>
      <pubDate>Mon, 31 Mar 2014 08:27:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243217#M3487</guid>
      <dc:creator>Artur Nowicki</dc:creator>
      <dc:date>2014-03-31T08:27:07Z</dc:date>
    </item>
    <item>
      <title>after you generated CSR and</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243218#M3488</link>
      <description>&lt;P&gt;after you generated CSR and private key, where did you sign your CSR, and what type of certificate is it ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;WSA only supports root signing certificate which is something like subordinate certificate authority or trusted certificate authority. not the server certificate which is referring web server certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;as far as I know, the public certificate authority does not sign us as signing certificate or root certificate for security reasons.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is what I am struglling with too.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Apr 2014 09:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243218#M3488</guid>
      <dc:creator>jiyoung Kim</dc:creator>
      <dc:date>2014-04-16T09:23:35Z</dc:date>
    </item>
    <item>
      <title>I thought I'd just add my</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243219#M3489</link>
      <description>&lt;P&gt;I thought I'd just add my solution to this as I've just gone through the pain of creating this key and the other two (Management Interface and Forward Proxy Mode).&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: I have created this to work with an internal Microsoft Certificate Server on our domain. The certificates were created using OpenSSL and CertSrv&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Credit to Jeff who posted on Byte of IT where I took some information from&amp;nbsp;http://byteof.it/?p=315&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 1 -&amp;nbsp;&lt;/STRONG&gt;GENERATE ROOT CERTIFICATE&lt;/P&gt;&lt;P&gt;Create the key and request file:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl req -new -newkey rsa:2048 -nodes -keyout WSA-ROOT.encrypted.key -out WSA-ROOT.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Submit the request to CertSrv (check your Subordinate CA Template is present and it's alias is SubCA)&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;certreq -submit -attrib "CertificateTemplate:SubCA" &amp;nbsp;WSA-ROOT.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Login to the Certificate Authority and approve the certificate from the Pending Requests.&lt;/P&gt;&lt;P&gt;Navigate to Issued Certificates and find your new certificate (Check the template is showing as "Subordinate Certification Authority (SubCA)).&lt;/P&gt;&lt;P&gt;Open the certificate, go to the Details tab and click on "Copy to File".&lt;/P&gt;&lt;P&gt;Export the key as Base-64 encoded X.509 (.CER) - Save to same directory as your key and req file as WSA-ROOT.cer&lt;/P&gt;&lt;P&gt;Convert the key from encrypted format&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl rsa -in WSA-ROOT.encrypted.key -out WSA-ROOT.key&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;On the WSA GUI goto&amp;nbsp;&lt;/P&gt;&lt;P&gt;Security Services &amp;gt; HTTPS Proxy &amp;gt; HTTPS Proxy Settings &amp;gt; Edit Settings &amp;gt; Root Certificate for Signing&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Certificate File: WSA-ROOT.cer&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Key File: WSA-ROOT.key&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Upload Files&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Submit&lt;/P&gt;&lt;P&gt;You should now have a working Root Certificate.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 2&lt;/STRONG&gt; -&amp;nbsp;GENERATE FORWARD PROXY MODE CERTIFICATE&lt;/P&gt;&lt;P&gt;Create the key and request file:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl req -new -newkey rsa:2048 -nodes -keyout WSA-FwdPr.encrypted.key -out WSA-FwdPr.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Fill in the details is asks for.&lt;/P&gt;&lt;P&gt;Submit the request to CertSrv (check your Web Server&amp;nbsp;is present and it's alias is WebServer)&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;certreq -submit -attrib "CertificateTemplate:WebServer" WSA-FwdPr.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Login to the Certificate Authority and approve the certificate from the Pending Requests.&lt;/P&gt;&lt;P&gt;Navigate to Issued Certificates and find your new certificate (Check the template is showing as "Web Server(WebServer)).&lt;/P&gt;&lt;P&gt;Open the certificate, go to the Details tab and click on "Copy to File".&lt;/P&gt;&lt;P&gt;Export the key as Base-64 encoded X.509 (.CER) - Save to same directory as your key and req file as WSA-FwdPr.cer&lt;/P&gt;&lt;P&gt;Convert the key from encrypted format&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl rsa -in WSA-FwdPr.encrypted.key -out WSA-FwdPr.key&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;On the WSA GUI goto&amp;nbsp;&lt;/P&gt;&lt;P&gt;Network &amp;gt; Authentication &amp;gt; Forward Proxy Mode Authentication Settings &amp;gt; Advanced&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Certificate File:&amp;nbsp;WSA-ROOT.cer&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Key File:&amp;nbsp;WSA-ROOT.key&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Upload Files&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;Submit&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Step 3&lt;/STRONG&gt; -&amp;nbsp;GENERATE HTTPS MANAGEMENT CERTIFICATE&lt;/P&gt;&lt;P&gt;Create the key and request file:&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl req -new -newkey rsa:2048 -nodes -keyout WSA-Mgmt.encrypted.key -out&amp;nbsp;WSA-Mgmt.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Fill in the details is asks for.&lt;/P&gt;&lt;P&gt;Submit the request to CertSrv (check your Web Server&amp;nbsp;is present and it's alias is&amp;nbsp;WebServer)&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;certreq -submit -attrib "CertificateTemplate:WebServer"&amp;nbsp;WSA-Mgmt.req&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Login to the Certificate Authority and approve the certificate from the Pending Requests.&lt;/P&gt;&lt;P&gt;Navigate to Issued Certificates and find your new certificate (Check the template is showing as "Web Server(WebServer)).&lt;/P&gt;&lt;P&gt;Open the certificate, go to the Details tab and click on "Copy to File".&lt;/P&gt;&lt;P&gt;Export the key as Base-64 encoded X.509 (.CER) - Save to same directory as your key and req file as&amp;nbsp;WSA-Mgmt.cer&lt;/P&gt;&lt;P&gt;Convert the key from encrypted format&lt;/P&gt;&lt;P style="margin-left: 40px;"&gt;&lt;CODE&gt;openssl rsa -in&amp;nbsp;WSA-Mgmt.encrypted.key -out&amp;nbsp;WSA-Mgmt.key&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;Now login to the console on the WSA Appliance and type CERTCONFIG&lt;/P&gt;&lt;P&gt;then SETUP&lt;/P&gt;&lt;P&gt;Open WSA-Mgmt.cer in a text editor and then paste in the contents&amp;nbsp;WSA-Mgmt.cer to the console followed by a "." on the next line.&lt;/P&gt;&lt;P&gt;Open&amp;nbsp;WSA-Mgmt.key in a text editor and then paste in the contents of WSA-Mgmt.key&amp;nbsp;to the console followed by a "." on the next line.&lt;/P&gt;&lt;P&gt;&lt;EM&gt;If you wish you can add an intermediate (I did).&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;Type COMMIT to save.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this is of some use to someone out there. Odds are that when I have to renew again next year I'll be hunting for my post.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Sep 2014 14:27:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243219#M3489</guid>
      <dc:creator>Rick Williams</dc:creator>
      <dc:date>2014-09-09T14:27:36Z</dc:date>
    </item>
    <item>
      <title>This is some great</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243220#M3490</link>
      <description>&lt;P&gt;This is some great information, but has anyone done this using a public CA, not a Microsoft CA server?&lt;/P&gt;&lt;P&gt;If so, can anyone suggest the best place to get this intermediate certificate that is signed by the CSR and Key generated for the WSA?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Darren&lt;/P&gt;</description>
      <pubDate>Thu, 04 Dec 2014 00:17:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243220#M3490</guid>
      <dc:creator>Darren Lynn</dc:creator>
      <dc:date>2014-12-04T00:17:52Z</dc:date>
    </item>
    <item>
      <title>Just one additional question,</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243221#M3491</link>
      <description>&lt;P&gt;Just one additional question, as 2048 bit certificates is now default in 8.5.&lt;/P&gt;&lt;P&gt;If user&amp;nbsp;is accessing facebook, the proxy will generate a cert for facebook.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will this cert be cached? For how long?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Feb 2015 09:47:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243221#M3491</guid>
      <dc:creator>Erik Dahle</dc:creator>
      <dc:date>2015-02-16T09:47:39Z</dc:date>
    </item>
    <item>
      <title>I am trying to do the same</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243222#M3492</link>
      <description>&lt;P&gt;I am trying to do the same thing and to date I have been unable to find a workable solution. I submit the CSR I create using OpenSSL to my public CA for signing and then it is rejected by the WSA. I need to find a workable solution for my environment. Pushing a certificate to over 100k workstations is not a good solution.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Dominick&lt;/P&gt;</description>
      <pubDate>Mon, 11 May 2015 15:58:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/2243222#M3492</guid>
      <dc:creator>Dominick Converse</dc:creator>
      <dc:date>2015-05-11T15:58:21Z</dc:date>
    </item>
    <item>
      <title>Re: I am trying to do the same</title>
      <link>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/3373852#M7769</link>
      <description>&lt;P&gt;Any Update on this Topic?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;on our case, web traffic managed by WSA covers employees and visitors.. for employees, the Self-Signed Certificate works fine and has been applied, via GPO, distributing certificates to extensions under MSFT AD. However, visitors are receiving the "invalid certificate message". Any tip on it?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We've been trying to generate a public SSL certificate using GoDaddy, and, no success. However, we're still trying to find a solution that visitors, using company WebAccess, can access HTTPS pages without receiving disturbing messages.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any update? Any idea? take care and thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Apr 2018 15:11:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/web-security/2048-bit-key-for-ironport-wsa-for-https-proxy/m-p/3373852#M7769</guid>
      <dc:creator>rps.soares</dc:creator>
      <dc:date>2018-04-26T15:11:32Z</dc:date>
    </item>
  </channel>
</rss>

