About SSL Certificates and Threat Grid Appliance
All network traffic passing to and from the Threat Grid Appliance is encrypted using SSL. The following information is provided to assist you through the steps for setting up SSL certificates to support Threat Grid Appliance connections with Email Security Appliance (ESA), Web Security Appliance (WSA), AMP for Endpoints Private Cloud, and other integrations.
Note |
A full description of how to administer SSL certificates is beyond the scope of this guide. |
Interfaces Using SSL
There are two interfaces on the Threat Grid Appliance that use SSL:
-
Clean interface for the Threat Grid Portal UI and API, and integrations (ESA/WSA appliances, AMP for Endpoints Private Cloud Disposition Update Service).
-
Admin interface for the OpAdmin Portal.
Supported SSL/TLS Version
The following versions of SSL/TLS are supported on the Threat Grid Appliance:
-
TLS v1.0 - Disabled in the Admin interface (v2.7 and later)
-
TLS v1.1 - Disabled in the Admin interface (v2.7 and later)
-
TLS v1.2
Note |
TLS v1.0 and TLS v1.1 are disabled in the Admin interface (v2.7 and later), and disabled by default for the main application. If one of these protocols is required for integration compatibility purposes, they can be re-enabled (for the main application only) from the tgsh. |
Supported Customer-Provided CA Certificates
Customer-provided CA certificates are supported (v2.0.3 and later) to allow customers to import their own trusted certificates or CA certificates.
Self-Signed Default SSL Certificates
The Threat Grid Appliance is shipped with a set of self-signed SSL certificates and keys already installed. One set is for the Clean interface and the other is for the Admin interface. The appliance SSL certificates can be replaced by an administrator.
The default Threat Grid Appliance SSL certificate hostname (Common Name) is pandem, and is valid for 10 years. If a different hostname was assigned to the Threat Grid appliance during configuration, then the hostname and the Common Name in the certificate will no longer match.
The hostname in the certificate must also match the hostname expected by a connecting ESA or WSA appliance, or other integrating Cisco device or service, as many client applications require SSL certificates where the Common Name used in the certificate matches the hostname of the appliance.