This Configuration Guide shows how to create a certificate structure using the tool XCA.

Certificates or a certificate structure are necessary for various router applications including:

Situation

You want to set up a VPN network or a protected connection and need a certificate structure for authentication and encryption purposes.

Solution

The following describes how to create a complete certificate structure consisting of CA certificate, server certificate and key, client certificate and key as well as a certificate revocation list (CRL). Depending on your application, you might not need all of them.

It is prerequisite that you have downloaded and installed the XCA tool to your computer. It is also prerequisite that time and date of the PC are correct. [1]

Tip The generation of a Diffie-Hellman parameter set using XCA (menu File –> Generate DH parameter) is not described here, because a Diffie-Hellman parameter set is already stored on the router and can be downloaded in the cog outline AdministrationCertificates menu (download).

Preliminary steps

A database must be created first before creating the certificate structure. All keys and certificates of this CA project are stored in this database. The certificate templates help to keep consistency when creating the certificates.

  1. To create a database, open XCA and select FileNew DataBase (Ctrl+N).

  2. Select a suitable directory for the XCA database and enter a file name.

  3. Enter a password and click on OK to create the database. [2]

Creating certificate templates

Certificate templates can be used to store common information for all certificates and facilitate certificate creation.

  1. To create a CA certificate template, open XCA, change to the Templates tab and click on New Template.

  2. Select in the Preset Template values window [default] CA and click on OK.

  3. Enter your default values for the CA template without specifying a commonName
    cg en m3 creating certificates xca 01

  4. Change to the Extensions tab, adjust the validity period of the certificate by entering a time range, if required, and click on OK. [3]
    cg en m3 creating certificates xca 02

  5. Complete the template creation with OK. [4]

  6. Repeat the previous steps accordingly to create a server template and a client template; pay attention to use the templates [default] TLS_client or [default] TLS_server intended for these.

Tip If you want to create templates for server and client certificates for OpenVPN connections of INSYS routers that have the Check remote certificate type option (remote-cert-tls) enabled, you need to specify an additional extended key usage for these certificates. This key usage is pre-set in the default settings of XCA already. In order to ensure that this key usage is specified, change to the Key usage tab and check whether the key usage TLS Web Server Authentication for server templates or TLS Web Client Authentication for client templates is entered under X509v3 Extended Key Usage. If not, these can be specified on the Key usage tab.
Tip If you want to create special templates for certificates that can be used for encrypting or signing update packets for INSYS routers, you need to specify an additional key usage for these certificates. If you want to create these certificates from regular templates, you need to specify the key usage during certificate creation below. In order to specify the key usage, change to the Key usage tab and select the appropriate X509v3 Key Usage. The certificate for encryption must have set the key usage Data Encipherment and the certificate for the signature Digital Signature. This is described in detail in Signing and encrypting an update packet.

Creating the certificates and keys

You need a Common Name for the certificate generation. The Common Name is the unique member name of a participant in the secured network and is used for routing into the client networks for example. The Common Name must only be used for one participant and cannot be changed any more after the generation. Observe the capitalization for the Common Name and preferably use only one of these possibilities consistently. The maximum length of the Common Name for an INSYS router is 29 characters.

Creating a CA certificate and key

  1. To create a CA certificate and key, change to the Certificates tab and click on New Certificate. [5]

  2. Select above created CA template under Template for the new certificate.

  3. Click on Apply all to enter the data from the template into the form.
    cg en m3 creating certificates xca 03

  4. Change to the Subject tab, enter the commonName and enter this also as Internal Name.

  5. Click on Generate a new key.
    cg en m3 creating certificates xca 04

  6. Preferably use the commonName also as Name and click on Create.
    cg en m3 creating certificates xca 05

  7. Confirm the key creation with OK.

  8. Click on OK and confirm again with OK to complete the creation of the CA certificate.

Creating server and client certificates and keys

  1. To generate a server certificate and key, change to the Certificates tab and click on New Certificate.

  2. Select in the Signing section the Use this Certificate for signing option and select above created CA certificate.

  3. Select above created server template under Template for the new certificate.

  4. Click on Apply all to enter the data from the template into the form.
    cg en m3 creating certificates xca 06

  5. Change to the Subject tab, enter the commonName and enter this also as Internal Name.

  6. Click on Generate a new key.
    cg en m3 creating certificates xca 07

  7. Preferably use the commonName also as Name and click on Create.
    cg en m3 creating certificates xca 08

  8. Confirm the key creation with OK.

  9. Click on OK and confirm again with OK to complete the creation of the server certificate.

  10. Repeat the previous steps accordingly to create the necessary number of client certificates.

Tip Click on the Certificates tab in XCA on chevron right in front of the CA certificate in the overview to display all certificates created with this CA.

Exporting the certificates and keys

The certificates and keys created with XCA are stored in the respective XCA database. In order to upload the certificates and keys to the respective routers, browsers, etc., these must be exported. XCA offers different file formats for export. We describe the export to the data format PKCS#12 here, because this is suitable for all INSYS routers. In addition, PKCS#12 allows to export complete key pairs into a container, which reduces the upload effort. Since the certificate chain can also be exported, the CA certificate does not have to be exported separately. A password protection can be applied.

Warning Never export the CA key, because this is essential for the security of the connection.
  1. In order to export a certificate and key, change to the Certificates tab, highlight the certificate to be exported in the overview and click on Export.
    cg en m3 creating certificates xca 09

  2. Specify a path and file name in the Certificat export window.

  3. Select PKCS#12 chain as Export format and click on OK.
    cg en m3 creating certificates xca 10

  4. If you want to enhance the security of the certificate file transmission, specify in the Password window a password [6] and click on OK to export the certificate. [7]

  5. Repeat the previous steps accordingly to export all desired certificates.

Revoking certificates using a CRL

It is possible to create a Certificate Revocation List (CRL) for OpenVPN, which contains the revoked certificates. If certificates have to be revoked before their expiry (due to misuse for example), they can be entered into this list. Every updated list must then be uploaded to the device, which controls access.

  1. In order to revoke a certificate, change to the Certificates tab, right-click on the certificate to be revoked in the overview and click on Revoke in the context menu.
    cg en m3 creating certificates xca 11

  2. Specify the invalidation time in the Certificate revocation window, enter an optional Revocation reason and click OK to add this certificate to the CRL.
    cg en m3 creating certificates xca 12

  3. In order to create a CRL, change to the Certificates tab, right-click the CA certificate (!) CA chevron right Generate CRL.
    cg en m3 creating certificates xca 13

  4. Click In the Generate CRL window on OK to create the CRL.
    cg en m3 creating certificates xca 14

  5. Confirm the CRL creation with OK. [8]

  6. In order to export a CRL, change to the Revocation lists tab, highlight the CRL to be exported in the overview and click on Export.
    cg en m3 creating certificates xca 15

  7. Specify a path and file name in the Revocation list export window.

  8. Select PEM as Export format and click on OK to export the CRL.
    cg en m3 creating certificates xca 16

Troubleshooting

  • Check the system time and date of the computer to ensure the certificates are created with the actual date; otherwise they might be invalid.


Back to the Configuration Guides for INSYS routers

Back to overview


1. Certificates have an expiry date. A wrong system time (time and date) is a frequent failure source. Therefore, ensure that the system time of the PC is correct when creating the certificate structure.
2. We strongly recommend to specify a password. Remember this password carefully. You’ll need it every time you want to open the database of this CA project.
3. Select a time range that is reasonable for your purpose. The default values are a good guideline. Too long time ranges may cause security or compatibility problems.
4. You have created a template for a certificate with this. When using this template while creating a certificate, the respective fields will be initialised with the default values entered here.
5. The certificate of the CA (Certificate Authority) is used to sign the server and client certificates and keys of this PKI (Private Key Infrastructure).
6. If the password fields are left empty, no password will be applied.
7. This exports a certificate container containing the certificate, the key and the certificate chain including the CA certificate.
8. If further certificates are revoked after generating the CRL, it must be generated again.