Certificate revocation is checked based on the following
conditions:
OCSP-based (Online Certificate Status Protocol) checks are
enabled by default in FIPS-CC mode. You cannot disable the checks.
TLS and standard IPSec VPN connections are dropped if the
revocation check fails.
If no OCSP parameters are included in the certificate, OCSP
revocation checks are ignored. For example, in a syslog profile with
TLS, if the certificate does not contain the OCSP attributes, the ION
can't check the revocation status and hence will allow the TLS
connection to be established.
If OCSP attributes are included in the certificate and if the
certificate is revoked, connections will be dropped mandatorily.
If an ION device is unable to reach the OCSP responder, the
IPsec and TLS connections fail.
The OCSP responder should be reachable from the source
interface used for the syslog server or the standard VPN interface. OCSP
certificate revocation is done only for syslog over TLS and standard
IPSec (VPN ) tunnel using certificate-based authentication.