The passive-attack-protection-only keyring is generated when the appliance starts for the first time and not generally used in production. The keyring is tagged to a Device Profile called “passive-attack-protection-only” and is sometimes used for Secure ADN encryption with no endpoint authentication.
Keyring lifetime time is 2 years.
This keyring is not used in the production and can be replaced with self-signed certificate .
This requires access to system with OpenSSL utility installed.
[ req ]
distinguished_name = req_distinguished_name
x509_extensions = v3_ca
prompt = no
[ req_distinguished_name ]
C = US
ST = California
L = San Francisco
O = Broadcom Edge SWG passive-attack-protection-only-keyring
OU = Engineering
CN = localhost
[ v3_ca ]
basicConstraints = critical, CA:TRUEopenssl req -x509 -nodes -days 730 -newkey rsa:2048 \
-keyout private.key \
-out certificate.crt \
-config openssl.cnf \
-extensions v3_cacat private.key certificate.crt > inline.txt#conf t
#(config)ssl
#(config ssl)inline keyring show passive-attack-protection-only-key --EOF--
< CONTENTS OF inline.txt file >
--EOF--
If Health Monitoring does not clear Critical alert this may require device restart to reflect the changes.