We use cookies on our website to ensure we provide you with the best experience on our website. By using our website, you agree to the use of cookies for analytics and personalized content.This website uses cookies. More Information
It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall


Barracuda CloudGen Firewall version 8.0 is a cloud-only version. It is currently not available for on-premises deployments and can only be deployed in Microsoft Azure, Amazon Web Services, or Google Cloud Platform public clouds.

PKI Certificate Settings

  • Last updated on

For each PKI certificate, you can view and edit the settings in the following sections:  

General Settings

Setting Setting Description Options
Keysize in Bits Specifies the key size in bits. Normally the value ranges from 512 to 4096 bits (default: 1024). The key size must be at least 1024 bits for end-user certificates. When the lifetime of the CA is 10 years or longer, the key size must be at least 2048 bits (Recommended: 4096).
  • 512
  • 1024 (Default)
  • 2048
  • 4096
Duration of Validity In days, specifies how long the certificate remains valid (default: 5000). For example, enter 5475 days for a root certificate that will remain valid for 15 years (365 * 15).
Key Algorithm Specifies the algorithm used for key creation
  • rsa (Default)
  • dsa
Key Encryption Specifies the algorithm used for key encryption
  • TripleDES (Default)
  • IDEA
  • DES
Message Digest Algorithm Specifies the hash algorithm 
  • md2
  • md5
  • mdc2
  • sha1 (Default)
Password Defines the certificate password.
Validate Password Validates the certificate password.


Setting Setting Description
Common Name Specifies the name of the certificate. (Do not use special characters and underscores in the common name!)
Email Address Specifies the email address of the certificate owner
Country State or Province / Locality / Organisation / Organisation Unit Specifies the address of the organization.

V3 Extensions

For more information on V3 extensions, see RFC 3280 at http://www.ietf.org/rfc/rfc3280.txt.

If you select the Critical check box for an application, the application must use V3 extensions. The certificate may then only be used as specified in the keyUsage and extendedKeyUsage settings.

Setting Setting Description  OID/CANBECRIT Values

Defines whether the certificate is a CA (CA:true) or not (CA:false - default).

The CA boolean indicates whether the certified public key belongs to a CA.

If the CA boolean is not asserted, then the keyCertSign bit in the key usage extension MUST NOT be asserted.



  • true
  • false


Specifies the purpose of the key contained in the certificate. This extension is useful when the key can be used for more than one operation.



  • digitalSignature - (0)
  • nonRepudiation - (1)
  • keyEncipherment - (2)
  • dataEncipherment - (3)
  • keyAgreement - (4)
  • keyCertSign - (5)
  • cRLSign - (6)
  • encipherOnly - (7)
  • decipherOnly - (8)
  • 0) sign for entity authentication and data origin authentication with integrity 1) sign with anon-repudiation service.
  • 2) encrypt keys for transport using RSA like algorithms.
  • 3) encrypt data.
  • 4) exchange keys using D-H like algorithms.
  • 5) sign certificates.
  • 6) sign CRLs.
  • 7) encrypt data using D-H like algorithms.
  • 8) decrypt data using D-H like algorithms.

Indicates one or more purposes for which the certified public key may be used, in addition to purpose specifies by the keyUsage extension. In general, this extension is only used in end entity certificates.



  • serverAuth
  • clientAuth
  • emailProtection
  • codeSigning
  • timeStamping
  • OCSPSigning
  • smarCardLogon
  • secureMail
  • msCodInd (MS Individual Code Signing)
  • msCodeCom (MS Commercial Code Signing)
  • msCTLSign (MS Trust List Signing)
  • msSGC (MS Server Gated Cryptography)
  • msEFS (MS Encrypted File System)

Hash of the subject. This extension provides a means of identifying certificates that contain a particular public key.




authorityKeyIdentifier Specifies the public key that is used to verify the signature on this certificate or CRL.



  • keyid:always
  • keyid:copy
  • issuer:always
  • issuer:copy

Indicates how to access CA information and services for the issuer of the certificate in which the extension appears. Information and services may include online validation services and CA policy data. (The location of CRLs is not specified in this extension; that information is provided by the cRLDistributionPoints extension.) This extension may be included in end entity or CA certificates, and it MUST be non-critical.


A string. For example:
OCSP;URI: ocsp.my.host/ or
caIssuers;URI: my.ca/ca.html


Specifies additional identities that are bound to the subject of the certificate. You can specify an email address, a DNS name, an IP address, a uniform resource identifier (URI), MS Domain GUID, or MS Domain User.



  • Email - enter an email address or "copy" for copying from subject
  • DNS
  • URI
  • IP
  • MS Domain GUID - for Smartcard Server
  • MS Domain User - for Smartcard User
issuerAltName Associates Internet-style identities with the certificate issuer.




Specifies the distribution points for the Certificate Revocation List (CRL).


This lists the distribution points for CRLs.

DomainController Specifies a Microsoft-specific extension for entering DomainControllers.


This is a Microsoft specific extension needed for smartcard login.

  • Machine-  For a machine
  • SmartCardLogon -  For a user (logon)
  • SmartCardUser - For a user (logon and email)
nsCert Type Specifies a Netscape certificate type.
  • client
  • server
  • email
  • objsign
  • sslCA
  • emailCA
  • objCA
nsComment Enables you to enter comments. OID = 2.16.840.1.113730.1.13 Just an extension to provide a possibility for a comment. This is an old Netscape extension.
Last updated on