Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

Navigation
Guide That Contains This Content
[+] Expand All
[-] Collapse All

    Understanding Certificate Chains

    Multilevel Hierarchy for Certificate Authentication

    Certificate-based authentication is an authentication method supported on SRX Series devices during IKE negotiation. In large networks, multiple certificate authorities (CAs) can issue end entity (EE) certificates to their respective end devices. It is common to have separate CAs for individual locations, departments, or organizations.

    When a single-level hierarchy for certificate-based authentication is employed, all EE certificates in the network must be signed by the same CA. All firewall devices must have the same CA certificate enrolled for peer certificate validation. The certificate payload sent during IKE negotiation only contains EE certificates.

    Alternatively, the certificate payload sent during IKE negotiation can contain a chain of EE and CA certificates. A certificate chain is the list of certificates required to validate a peer’s EE certificate. The certificate chain includes the EE certificate and any CA certificates that are not present in the local peer.

    The network administrator needs to ensure that all peers participating in an IKE negotiation have at least one common trusted CA in their respective certificate chains. The common trusted CA does not have to be the root CA. The number of certificates in the chain, including certificates for EEs and the topmost CA in the chain, cannot exceed 10.

    In the example CA hierarchy shown in Figure 1, Root-CA is the common trusted CA for all devices in the network. Root-CA issues CA certificates to the engineering and sales CAs, which are identified as Eng-CA and Sales-CA, respectively. Eng-CA issues CA certificates to the development and quality assurance CAs, which are identified as Dev-CA and Qa-CA, respectively. Host-A receives its EE certificate from Dev-CA while Host-B receives its EE certificate from Sales-CA.

    Figure 1: Multilevel Hierarchy for Certificate-Based Authentication

     Multilevel
Hierarchy for Certificate-Based Authentication

    Each end device needs to be loaded with the CA certificates in its hierarchy. Host-A must have Root-CA, Eng-CA, and Dev-CA certificates; Sales-CA and Qa-CA certificates are not necessary. Host-B must have Root-CA and Sales-CA certificates. Certificates can be loaded manually in a device or enrolled using the Simple Certificate Enrollment Process (SCEP).

    Each end device must be configured with a CA profile for each CA in the certificate chain. The following output shows the CA profiles configured on Host-A:

    admin@host-A# show security
    pki {
        ca-profile Root-CA {
            ca-identity Root-CA;
            enrollment {
                url “www.example.net/scep/Root/”;
            }
        }
        ca-profile Eng-CA {
            ca-identity Eng-CA;
            enrollment {
                url “www.example.net/scep/Eng/”;
            }
        }
        ca-profile Dev-CA {                  
            ca-identity Dev-CA;
            enrollment {
                url “www.example.net/scep/Dev/”;
            }
        }
    }

    The following output shows the CA profiles configured on Host-B:

    admin@host-B# show security
    pki {
        ca-profile Root-CA {
            ca-identity Root-CA;
            enrollment {
                url “www.example.net/scep/Root/”;
            }
        }
        ca-profile Sales-CA {
            ca-identity Sales-CA;
            enrollment {
                url “www.example.net/scep/Sales/”;
            }
        }
    }

    Dynamic CRL Download and Checking

    Digital certificates are issued for a set period of time and are invalid after the specified expiration date. A CA can revoke an issued certificate by listing it in a certificate revocation list (CRL). During peer certificate validation, the revocation status of a peer certificate is checked by downloading the CRL from a CA server to the local device.

    A VPN device must be able to check a peer’s certificate for its revocation status. A device can use the CA certificate received from its peer to extract the URL to dynamically download the CA’s CRL and check the revocation status of the peer’s certificate. A dynamic CA profile is automatically created on the local device with the format dynamic-nnn. A dynamic CA profile allows the local device to download the CRL from the peer’s CA and check the revocation status of the peer’s certificate. In Figure 1, Host-A can use the Sales-CA and EE certificates received from Host-B to dynamically download the CRL for Sales-CA and check the revocation status of Host-B’s certificate.

    To enable dynamic CA profiles, the revocation-check crl option must be configured on a parent CA profile at the [edit security pki ca-profile profile-name] hierarchy level.

    The properties of a parent CA profile are inherited for dynamic CA profiles. In Figure 1, the CA profile configuration on Host-A for Root-CA enables dynamic CA profiles as shown in the following output:

    admin@host-A# show security
    pki {
        ca-profile Root-CA {
            ca-identity Root-CA;
            enrollment {
                url “www.example.net/scep/Root/”;
            }
            revocation-check {
                crl;
            }
        }
    }

    A dynamic CA profile is created on Host-A for Sales-CA. Revocation checking is inherited for the Sales-CA dynamic CA profile from Root-CA.

    If the revocation-check disable statement is configured in a parent CA profile, dynamic CA profiles are not created and dynamic CRL download and checking is not performed.

    The data for CRLs downloaded from dynamic CA profiles are displayed with the show security pki crl command in the same way as CRLs downloaded by configured CA profiles. The CRL from a dynamic CA profile is updated periodically as are those for CA profiles that are configured in the device.

    Note: The CA certificate is required to validate the CRL received from a CA server; therefore, the CA certificate received from a peer is stored on the local device. Because the CA certificate is not enrolled by an administrator, it is used only for validating the CRL received from the CA server and not for validating the peer certificate.

    Modified: 2016-07-06