Gateway

Validation of the server certificate during an SSL handshake

NetScaler Gateway can be configured to validate the server certificate provided by the back-end server during an SSL handshake.

Starting from NetScaler Gateway release 14.1 build 56.x, when you enable server certificate validation, NetScaler Gateway validates the SSL VDA certificates in addition to the Secure Ticket Authority (STA) and StoreFront server certificates.

Note:

For double-hop deployments, the configuration for server certificate validation must be done on the second hop.

To configure server certificate validation by using the GUI

Bind the CA certificate

  1. Navigate to NetScaler Gateway > NetScaler Gateway Policy Manager > Certificate Bindings.

  2. In the Certificate Bindings section, click the + icon.

  3. In the SSL Certificate(s) Binding page, click Add Binding.

  4. In CA Cert, click Add.

  5. In the Install CA Certificate page, select the certificate file name in the Certificate File Name field and click Install.

  6. In the SSL Certificate(s) Binding page, select the certificate and click Bind.

  7. Click Done.

Enable the certificate validation

  1. Navigate to NetScaler Gateway > Global settings.

  2. Click Change Global Settings.

  3. Select Enabled from the Backend Server Certificate Validation drop-down menu and click OK.

To configure server certificate validation by using the CLI

At the command prompt, type the following commands:

bind vpn global cacert <cacert_name>
set vpn parameter backendcertValidation ENABLED
<!--NeedCopy-->
Validation of the server certificate during an SSL handshake