Configure TLS/SSL Settings for a Threat Intelligence Director Source

Configure SSL Settings if the host server requires an encrypted connection.

Before you begin

Procedure


Step 1

In the Edit Source dialog box, expand the SSL Settings section.

Step 2

If your server certificate is self-signed:

  1. Enable Self-Signed Certificate.

  2. Choose a SSL Hostname Verification method.

    • Strictthreat intelligence director requires the source URL to match the hostname provided in the server certificate.

      If the hostname includes a wildcard, TID cannot match more than one subdomain.

    • Browser Compatiblethreat intelligence director requires the source URL to match the hostname provided in the server certificate.

      If the hostname includes a wildcard, TID matches all subdomains.

    • Allow Allthreat intelligence director does not require the source URL to match the hostname provided in the server certificate.

    For example, if subdomain1.subdomain2.cisco.com is your source URL and *.cisco.com is the hostname provided in the server certificate:

    • Strict hostname verification fails.

    • Browser Compatible hostname verification succeeds.

    • Allow All hostname verification ignores the hostname values completely.

  3. For Server Certificate:

    • If you have access to the PEM-encoded self-signed server certificate, open the certificate in a text editor and copy the entire block of text, including the BEGIN CERTIFICATE and END CERTIFICATE lines. Enter this entire string into the field.

    • If you do not have access to the self-signed server certificate, leave the field blank. After you save the source, threat intelligence director retrieves the certificate from the server.

Step 3

If your server requires a user certificate:

  1. Enter a User Certificate:

    Open the PEM-encoded certificate in a text editor and copy the entire block of text, including the BEGIN CERTIFICATE and END CERTIFICATE lines. Enter this entire string into the field.

  2. Enter a User Private Key:

    Open the private key file in a text editor and copy the entire block of text, including the BEGIN RSA PRIVATE KEY and END RSA PRIVATE KEY lines. Enter this entire string into the field.


What to do next