That command seems to have a syntax problem, showing: "unknown option
[cert.pem-inserted my cert here]"



On Mon, Aug 25, 2008 at 10:55 PM, Tim Hudson <[EMAIL PROTECTED]> wrote:
> Chris Zimmerman wrote:
>>
>> I am working to setup a Watchguard firewall with x509 certs for VPN
>> tunnels.  I have created my own CA on my laptop and I have created a
>> CSR on the Watchguard product.  I have then signed the CSR with my CA
>> certificate successfully which then imports into the Watchguard.
>> Here's the problem: Watchguard requires that the cert be typed as
>> "Web" or "IPSec" if it is to be used for VPN tunnels.  Everytime I
>> import my signed cert it shows up as a CA Cert type.  I know this is
>> an interop question, but has any got an idea of what to try to get
>> this working?  I've been at this for days now with no success.
>
> Look a the various settings for basic constraints, key usage and extended
> key usage as controlled in openssl.cnf ... basically you need to set them to
> match what Watchguard wants.
>
> Perhaps you have the v3_ca stuff set.
>
> The output of
>        openssl x509 -text -noout cert.pem
> will let me see what you have set in the way of those extensions.
>
> If you have a working certificate and a non-working one then comparing the
> text output should help show what the requirements are.
>
> Tim.
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to