Forum Discussion
Cynthia_18735
Nimbostratus
Apr 17, 2008Self-signed certificate in a Redirect
I have a virtual server setup to receive SSL traffic. The virtual server has a CLIENTSSL profile on it, with a self-signed SSL certificate. The virtual servers only purpose is to do a redirect. So, there is a rule in place that redirects.
So, for instance the user goes to the site as:
https:\\urlname.com (self-signed certificate here)
The rule redirects to:
https:\\www.urlname.com (Verisign certificat here)
In IE, this works just fine. The user doesn't get any pop-ups, etc. In Firefox, the user does get pop-ups, indicating there may be a security problem with the CA.
So, my question is - is there any way to get this to work on BigIP without the user receiving a security pop-up (short of getting a Verisign signed certificate).
- hoolio
Cirrostratus
If the browser is configured to generate an alert when the requested hostname doesn't match the subject of the SSL certificate a site presents, then I could see that it would work in IE. However, with default settings in IE, you should see the mismatched certificate warning. By design of SSL certificates there isn't a way to configure a web server to prevent the client from 'seeing' that the cert isn't valid. You'd need to get a certificate which is valid for the host name that the client requests, or change the browser settings for each client.
Recent Discussions
Related Content
DevCentral Quicklinks
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com
Discover DevCentral Connects