Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Multiple Certificates and Domains Configuration (CLI Procedure)

Overview

In this configuration, you create multiple certificates with multiple domain names on the SRX Series Firewall.

Before you begin, as an administrator -

  1. Complete the basic setup of the SRX Series Firewall.

  2. Identify the domain names to be associated with Juniper Secure Connect. These are mapped to the Juniper Secure Connect Connection profiles which are URLs in FQDN or FQDN/RealmName format. See Table 1, for the sample domain names and certificates used in this configuration.

  3. In case you need to map multiple domain names to a single certificate, ensure to generate the certificate externally. If you have a Let’s Encrypt certificate, ensure it is generated using Let’s Encrypt server. See ACME Protocol.

Table 1: Domain Names and Certificates Mapping

Domain Name

Certificate

srx.example.com

internal

gateway.example.com 

external

gateway1.example.com 

letsencrypt

gateway2.example.com 

letsencrypt

Configure the gateway certificates for the domain names mentioned in the URLs on your SRX Series Firewall using the configuration statements.

Configure Multiple Certificates and Domains

To configure multiple certificates and multiple domains using the command line interface:

  1. Log in to your SRX Series Firewall using the command line interface (CLI).

  2. If you need an self-signed certificate, generate a public key infrastructure (PKI) public/private key pair for a local digital certificate in the SRX Series Firewall.

  3. Manually generate and load self-signed certificate(s). You can also load an externally generated CA signed certificate.

  4. Enter the configuration mode.

  5. Configure multiple domains using virtual-domain option and associate them with the corresponding certificate. Ensure to generate the certificate externally. If you have a Let’s Encrypt certificate, see ACME Protocol.

  6. Configure a certificate with multiple domain-names. Ensure you generated these certificates separately. See ACME Protocol.

  7. When you are done configuring the feature on your device, enter commit from configuration mode.

Your end users can now use the corresponding certificates to initiate a connection. This ensures that when the Juniper Secure Connect application initiates a connection, server side certificate is validated and trusted if that corresponding certificate is loaded in the Juniper Secure Connect client.