Certificate revocation is checked based on the following
                    conditions:
- OCSP-based (Online Certificate Status Protocol) checks are
                            enabled by default in FIPS-CC mode. You cannot disable the checks. 
- TLS and standard IPSec VPN connections are dropped if the
                            revocation check fails. 
- If no OCSP parameters are included in the certificate, OCSP
                            revocation checks are ignored. For example, in a syslog profile with
                            TLS, if the certificate does not contain the OCSP attributes, the ION
                            can't check the revocation status and hence will allow the TLS
                            connection to be established. 
- If OCSP attributes are included in the certificate and if the
                            certificate is revoked, connections will be dropped mandatorily.  
- If an ION device is unable to reach the OCSP responder, the
                            IPsec and TLS connections fail. 
- The OCSP responder should be reachable from the source
                            interface used for the syslog server or the standard VPN interface. OCSP
                            certificate revocation is done only for syslog over TLS and standard
                            IPSec (VPN ) tunnel using certificate-based authentication.