Jump to navigation

  • English
  • Русский
Home
  • Resources

      • Document Library
      • Video
      • Changes in UserGate 5
      • Changes in UserGate 6
      • Changes in UserGate Management Center 6
      • Changes in UserGate Log Analyzer 6
      • Changes in UserGate 7
      • Changes in UserGate Management Center 7
      • Changes in UserGate Log Analyzer 7
      • Changes in UserGate SIEM 7
      • Changes in UserGate WAF 7

      • L7 Applications
      • Categories
  • Support service
    • Add a Ticket
    • Download
    • Demo Online
  • Lifecycle

You are here

Home > Support Portal > Documentation > UserGate 7 > 22. Appendix 2. Installing local CA certificates

Search form

  • 1. Introduction
    • 1.1. Network Security and Threat Protection
      • 1.1.1. Firewalling
      • 1.1.2. Intrusion Detection and Prevention
      • 1.1.3. DoS and Network Flood Protection
      • 1.1.4. Checking Traffic for Malware
      • 1.1.5. Email Traffic Checking
      • 1.1.6. Integrating with External Security Systems
      • 1.1.7. Scenario-Based Security Policy Configuration
    • 1.2. Internet Performance and Reliability Improvement
      • 1.2.1. Clustering and High Availability Support
      • 1.2.2. FTP over HTTP
      • 1.2.3. Multi-Provider Support
      • 1.2.4. Traffic Shaping Management
      • 1.2.5. WCCP Support
    • 1.3. Traffic Management and Internet Access Control
      • 1.3.1. Traffic Routing and Resource Publishing
      • 1.3.2. User Authentication
      • 1.3.3. Guest Portal Support
      • 1.3.4. Application Proxying
    • 1.4. Content Filtering and Application Control
      • 1.4.1. Internet Filtering
      • 1.4.2. Selective Ad Blocking
      • 1.4.3. Safe Search Activation
      • 1.4.4. Social Network App Blocking
      • 1.4.5. Code Injection into Webpages
      • 1.4.6. SSL Traffic Inspection
      • 1.4.7. VPN and Web Portal
    • 1.5. Logs and Reports
    • 1.6. Other Features
      • 1.6.1. Role-Based Administrator Access to UserGate Controls
      • 1.6.2. Using Notifications
      • 1.6.3. Interface Types
      • 1.6.4. DNS Filtering
      • 1.6.5. Load Balancer
  • 2. Initial Configuration
    • 2.1. Network Environment Requirements
    • 2.2. Virtual Appliance Deployment
    • 2.3. Connecting to UserGate
    • 2.4. Automate UserGate Deployment Using Cloud-init
  • 3. UserGate Licensing
    • 3.1. Licensing for the number of concurrently connected devices
    • 3.2. Licensing for platform performance parameters
    • 3.3. Additional modules to be licensed
  • 4. Device Setup
    • 4.1. General Settings
    • 4.2. Device management
      • 4.2.1. Diagnostics
      • 4.2.2. Server operations
      • 4.2.3. System backup management
      • 4.2.4. Settings export and import
    • 4.3. Clustering and High Availability
      • 4.3.1. Configuration cluster
      • 4.3.2. Active-Passive HA Cluster
      • 4.3.3. Active-Active HA Cluster
    • 4.4. UserGate Console Access Management
    • 4.5. Certificate Management
      • 4.5.1. Using Corporate CA to Create an SSL Inspection Certificate
  • 5. Network Configuration
    • 5.1. Zone Configuration
    • 5.2. Network Interface Configuration
      • 5.2.1. Creating a VLAN Interface
      • 5.2.2. Bonding Network Interfaces
      • 5.2.3. Interface Bridging
      • 5.2.4. PPPOE Interface
      • 5.2.5. VPN Interface
      • 5.2.6. Tunnel Interface
      • 5.2.7. Netflow Configuration
    • 5.3. Gateway Configuration
    • 5.4. DHCP Configuration
    • 5.5. DNS Configuration
    • 5.6. Virtual Routers
      • 5.6.1. Static Routes
      • 5.6.2. Dynamic Routing Protocols
      • 5.6.3. OSPF
      • 5.6.4. BGP
      • 5.6.5. RIP
      • 5.6.6. Multicasting
    • 5.7. WCCP
  • 6. Users and Devices
    • 6.1. Groups
    • 6.2. Users
    • 6.3. Auth servers
      • 6.3.1. LDAP Connector
      • 6.3.2. RADIUS User Authentication Server
      • 6.3.3. TACACS+ User Authentication Server
      • 6.3.4. SAML IDP User Authentication Server
      • 6.3.5. NTLM Authentication Server
      • 6.3.6. Kerberos Authentication Method
      • 6.3.7. HTTP Basic Authentication Method
    • 6.4. Authentication Profiles
    • 6.5. Captive Portal Configuration
    • 6.6. MFA (Multi-Factor Authentication) Profiles
    • 6.7. Terminal Server Users
    • 6.8. Windows Authentication Agent
    • 6.9. Windows Proxy Agent
    • 6.10. Managing guest users
    • 6.11. RADIUS Accounting
  • 7. Network Policies
    • 7.1. Firewall
    • 7.2. NAT and Routing
      • 7.2.1. NAT Rules
      • 7.2.2. DNAT Rules
      • 7.2.3. Port Forwarding Rules
      • 7.2.4. Policy-Based Routing
      • 7.2.5. Network Mapping
    • 7.3. Load Balancing
    • 7.4. Traffic Shaping
  • 8. Security Policies
    • 8.1. Content Filtering
    • 8.2. Safe Browsing
    • 8.3. Tunnel Inspection
    • 8.4. SSL Inspection
    • 8.5. SSH Inspection
    • 8.6. Intrusion Detection and Prevention System
    • 8.7. Scenarios
    • 8.8. Working with External ICAP Servers
    • 8.9. Mail Security
      • 8.9.1. Antispam Configuration
    • 8.10. DoS Protection
  • 9. Global Portal
    • 9.1. Web Portal (SSL VPN)
    • 9.2. HTTP/HTTPS Resource Publishing Using Reverse Proxy
  • 10. VPN Settings
    • 10.1. Remote Access VPN
    • 10.2. Site-to-Site VPN connections
    • 10.3. IPsec over GRE
    • 10.4. GRE over IPsec
  • 11. Libraries of items
    • 11.1. Morphology
    • 11.2. Services
    • 11.3. Services groups
    • 11.4. IP Addresses
    • 11.5. Browser Useragent
    • 11.6. Content types
    • 11.7. URL lists
    • 11.8. Time Sets
    • 11.9. Bandwidth Pools
    • 11.10. Response Pages
    • 11.11. URL Categories
    • 11.12. Overridden URL categories
    • 11.13. Applications
    • 11.14. Emails
    • 11.15. Phones
    • 11.16. IPS Profiles
    • 11.17. Notification Profiles
    • 11.18. Netflow Profiles
    • 11.19. LLDP Profiles
    • 11.20. SSL Profiles
    • 11.21. SSL Forwarding Profiles
  • 12. Command Line Interface (CLI)
    • 12.1. Commands Available Prior to Initial Node Setup
    • 12.2. Initial Setup
    • 12.3. Diagnostics and Monitoring Commands
      • 12.3.1. Interface Statistics
      • 12.3.2. ARP Entries
      • 12.3.3. Packet Tracing
      • 12.3.4. Traffic Monitoring
      • 12.3.5. LLDP
      • 12.3.6. Routes
    • 12.4. Configuration mode
      • 12.4.1. Execute commands
      • 12.4.2. Import command
      • 12.4.3. Export command
    • 12.5. Configuring UserGate devices
      • 12.5.1. Configuring CLI
      • 12.5.2. UserGate General Settings
      • 12.5.3. Configuring device management
      • 12.5.4. Cluster settings
      • 12.5.5. Configuring UserGate console access control
      • 12.5.6. Configuring certificates
      • 12.5.7. Settings for device parameters
      • 12.5.8. Telemetry settings
      • 12.5.9. Configuring proxy servers
    • 12.6. UserGate network settings
      • 12.6.1. Zones
      • 12.6.2. Interfaces
      • 12.6.3. Gateways
      • 12.6.4. DHCP
      • 12.6.5. Configuration of DNS
      • 12.6.6. Configuring Virtual Routers
      • 12.6.7. Configuring WCCP
    • 12.7. Configuring rules using UPL
    • 12.8. Configuring the Users and devices section
      • 12.8.1. Configuring user groups
      • 12.8.2. Configuring users
      • 12.8.3. Configuring authentication servers
      • 12.8.4. Configuring authentication profiles
      • 12.8.5. Captive portal
      • 12.8.6. Configuring Captive profiles
      • 12.8.7. Configuring terminal servers
      • 12.8.8. Configuring MFA (multifactor authentication) profiles
    • 12.9. Configuring the Network policies section
      • 12.9.1. Configuring firewall rules
      • 12.9.2. Configuring NAT and routing rules
      • 12.9.3. Configuring load balancing
      • 12.9.4. Configuring traffic shaping rules
    • 12.10. Configuring the Security policies section
      • 12.10.1. Configuring content filtering
      • 12.10.2. Configuring safe browsing
      • 12.10.3. Configuring tunnel inspection rules
      • 12.10.4. Configuring SSL inspection
      • 12.10.5. Configuring SSH inspection
      • 12.10.6. Configuring IPS
      • 12.10.7. Configuring scenarios
      • 12.10.8. Configuring mail security rules
      • 12.10.9. Configuring ICAP rules
      • 12.10.10. Configuring ICAP servers
      • 12.10.11. Configuring DoS rules
      • 12.10.12. Configuring DoS profiles
    • 12.11. Configuring a global portal
      • 12.11.1. Configuring a web portal
      • 12.11.2. Configuring reverse proxy rules
      • 12.11.3. Configuring reverse proxy servers
    • 12.12. Configuring remote access (VPN)
      • 12.12.1. Configuring server rules
      • 12.12.2. Configuring client rules
      • 12.12.3. Configuring a VPN Network
      • 12.12.4. Configuring VPN security profiles
    • 12.13. Configuring libraries
      • 12.13.1. Configuring morphology
      • 12.13.2. Configuring services
      • 12.13.3. Configuring service groups
      • 12.13.4. Configuring IP addresses
      • 12.13.5. Configuring useragents
      • 12.13.6. Configuring content types
      • 12.13.7. Configuring URL lists
      • 12.13.8. Configuring time sets
      • 12.13.9. Configuring bandwidth pools
      • 12.13.10. Configuring response pages
      • 12.13.11. Configuring URL categories
      • 12.13.12. Configuring overridden URL categories
      • 12.13.13. Configuring applications
      • 12.13.14. Configuring email addresses
      • 12.13.15. Configuring phones
      • 12.13.16. Configuring IPS profiles
      • 12.13.17. Configuring notification profiles
      • 12.13.18. Configuring Netflow profiles
      • 12.13.19. Configuring LLDP profiles
      • 12.13.20. Configuring SSL profiles
      • 12.13.21. Configuring SSL forwarding profiles
  • 13. Platform Management Controller Command LIne Interface
    • 13.1. Basic Hardware Parameters
    • 13.2. Platform Management
    • 13.3. Network Settings Management
    • 13.4. Users Management
    • 13.5. PMC Loader Mode
  • 14. System utilities
  • 15. Dashboard
  • 16. Diagnostics and monitoring
    • 16.1. Traffic monitoring
    • 16.2. Routes
    • 16.3. VPN
    • 16.4. Web portal
    • 16.5. Packet capture
    • 16.6. Requests for white list
    • 16.7. Tracing rules
    • 16.8. Ping
    • 16.9. Traceroute
    • 16.10. DNS Query
    • 16.11. LLDP neighbors
    • 16.12. LLDP statistics
    • 16.13. Notifications
      • 16.13.1. Alert rules
      • 16.13.2. SNMP
  • 17. Logs and reports
    • 17.1. Logs
      • 17.1.1. Event log
      • 17.1.2. Web Access Log
      • 17.1.3. Traffic log
      • 17.1.4. IDPS log
      • 17.1.5. SCADA log
      • 17.1.6. SSH inspection log
      • 17.1.7. Search history
      • 17.1.8. Data search and filtering
      • 17.1.9. Log Export
    • 17.2. Reports
      • 17.2.1. Report templates
      • 17.2.2. Report rules
      • 17.2.3. Generated reports
  • 18. Guest portal
  • 19. Help
  • 20. ADMIN
  • 21. Appendix 1. Network environment requirements
  • 22. Appendix 2. Installing local CA certificates
    • 22.1. Installing certificates in Internet Explorer and Chrome browsers in Windows
    • 22.2. Installing certificates in Safari and Chrome browsers in MacOS X
    • 22.3. Installing certificate in Firefox
  • 23. Appendix 3. Log format description
    • 23.1. Logs Export in CEF Format
      • 23.1.1. Event log format
      • 23.1.2. Web access log format
      • 23.1.3. Traffic log format
      • 23.1.4. IDPS log format
      • 23.1.5. SCADA log format
      • 23.1.6. SSH inspection log format
    • 23.2. Export logs in JSON format
      • 23.2.1. Event log description
      • 23.2.2. Web access log description
      • 23.2.3. Traffic log description
      • 23.2.4. IDPS log description
      • 23.2.5. SCADA log description
      • 23.2.6. SSH inspection log description
  • 24. Appendix 4. DHCP Options

22. Appendix 2. Installing local CA certificates

Download the CA certificate you use to intercept HTTPS traffic as described in Certificate Management and follow the instructions later in this section to install the certificate.

  • 22.1. Installing certificates in Internet Explorer and Chrome browsers in Windows
  • 22.2. Installing certificates in Safari and Chrome browsers in MacOS X
  • 22.3. Installing certificate in Firefox
‹ 21. Appendix 1. Network environment requirements up 22.1. Installing certificates in Internet Explorer and Chrome browsers in Windows ›
Terms of Use|Privacy Policy

Copyright © 2001-2025 UserGate