End-of-Life (EoL)

Store Private Keys on an HSM

For added security, you can use an HSM to secure the private keys used in SSL/TLS decryption for:
  • SSL Forward Proxy—The HSM can store the private key of the Forward Trust certificate that signs certificates in SSL/TLS forward proxy operations. The firewall will then send the certificates that it generates during such operations to the HSM for signing before forwarding the certificates to the client.
  • SSL Inbound Inspection—The HSM can store the private keys for the internal servers for which you are performing SSL/TLS inbound inspection.
  1. On the HSM, import or generate the certificate and private key used in your decryption deployment.
    For instructions on importing or generating a certificate and private key on the HSM, refer to your HSM documentation.
  2. (
    nCipher nShield Connect only
    ) Synchronize the key data from the nShield Connect remote file system to the firewall.
    Synchronization with the SafeNet Network HSM is automatic.
    1. Access the firewall web interface and select
    2. Select
      Synchronize with Remote Filesystem
      in the Hardware Security Operations section.
  3. Import the certificate that corresponds to the HSM-stored key onto the firewall.
    1. Select
      Certificate Management
      Device Certificates
      and click
    2. Enter the
      Certificate Name
    3. Browse
      to the
      Certificate File
      on the HSM.
    4. Select a
      File Format
    5. Select
      Private Key resides on Hardware Security Module
    6. Click
  4. (
    Forward Trust certificates only
    ) Enable the certificate for use in SSL/TLS Forward Proxy.
    1. Open the certificate you imported in the previous step for editing.
    2. Select
      Forward Trust Certificate
    3. Click
  5. Verify that you successfully imported the certificate onto the firewall.
    Locate the certificate you imported and check the icon in the Key column:
    • Lock icon—The private key for the certificate is on the HSM.
    • Error icon—The private key is not on the HSM or the HSM is not properly authenticated or connected.

Recommended For You