Hello,
I’m looking to set up a VPN tunnel using certificate-based authentication, and I have a question regarding how to implement a multi-level trust chain on an SMS (R81-20).
Currently, each party shares its public certificate chain for authentication. For a two-level structure (Root CA > Sub CA), the Root CA certificate is registered in the SMS as a Trusted CA, and the Sub CA certificate is registered as a Subordinate CA:
Trusted Root CA > Subordinate Sub CA
However, what is the correct process when there is a third level or more (e.g., Root CA > Sub CA > Sub-Sub CA)?
Registering both the Sub CA and Sub-Sub CA as subordinate CAs in the SMS leads to incorrect interpretation:
Trusted Root CA > Subordinate Sub CA
Trusted Root CA > Subordinate Sub-Sub CA
Alternatively, registering the Sub CA as both a Trusted CA and a Subordinate CA results in this interpretation:
Trusted Root CA > Nothing
Trusted Sub CA > Subordinate Sub CA
Trusted Sub CA > Subordinate Sub-Sub CA
In both cases, the SMS does not correctly interpret the full chain as:
Root CA certifies for Sub CA which certifies for Sub-Sub CA
Would you have a clue on the correct procedure for configuring a multi-level certificate trust chain in the SMS?
Thank you in advance.