This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Declare Sophos XG to be default CA

Hi *,

I dived deeply in the last few days to understand Certification Authorities integrated into Sophos XG.
Therefor I successfully set up the Sophos XG to act as my main CA to access WebAdmin by importing the "Default" .der into my trusted roots certificates for my clients.
This is why I am able to use SSL-inspection as well!

To avoid importing multiple trusted root certificates I was wondering if my XG firewall can act as CA for other devices in my network (e.g. for my Synology NAS). In theory I mean this:

  1. Generate a self-signed certificate on my XG for "mysynologydevice.mydomain.com" signed by the "Default CA" of XG
  2. Import the needed files into Synology
  3. restart Webservices on Synology
  4. access mysynologydevice.mydomain.com via webbrowser having a trusted connection, while the imported certificate is signed by XG's CA which was imported in the first place

 

I tried to do these steps on my Synology, but encountered issues with the files, that need to be imported (invalid private key).
Is it even possible to sign certificates by Sophos XG CA for other devices?

 

best regards!



This thread was automatically locked due to age.
Parents
  • The quick answer is that the XG cannot be used to create certificates used by other devices.  But you can have certificates used by other devices, and also have the XG both going up to the same CA that you trust.


    First, you may want to read this for general info:
    https://community.sophos.com/products/xg-firewall/f/recommended-reads/121482/https-decrypt-and-scan-faq

    You are also getting into a bit of PKI, you may want to read up on how that works.  One thing is that you don't do anything directly with your root CA, you use intermediate CAs.  The XG has an intermediate CA it uses for HTTPS scanning.  Other intermediate CAs are used for other things, like signing your NAS.  If you are using a lot of Microsoft stuff, look at "Active Directory Certificate Services".

    However as general concepts, here is what I would do.

    Create your own root CA manually (eg with openssl or Microsoft AD).  Use it to create two intermediate CAs.  One will be your HTTPS scanning CA, the other for other internal certificates that you want to create.

    On the XG, you import the root CA (without the private key).  Then import the intermediate CA (with private key).  You can then use the intermediate CA as your signing CA for web traffic.

    Using the second intermediate CA, create a certificate.  Install the certificate and private key onto your NAS and restart it.


    On your clients, trust your root CA.
    If you clients go to your NAS directly they get a certificate signed by your intermediate, signed by your root (which they trust).
    If you clients do normal web browsing over the XG they get a certificate signed by your other intermediate (acting as a signing CA), signed by your root (which they trust).
    The XG will also naturally trust the NAS because it is signed by something that goes up to a CA that is trusted.

  • Hi Michael,

    thanks for your helpful answer. I feel like I have to dive a bit deeper into certificate chain technology to better understand the method of intermediate certificates.
    Thanks so far for the answer!

Reply Children
No Data