Knowledge Base

Distribute SonicWall DPI-SSL CA certificate to web browsers


Distribute SonicWall DPI-SSL CA certificate to web browsers


Distribute the SonicWall DPI-SSL CA certificate to different web browsers

In MS Windows, Internet Explorer, Chrome, Opera browsers share the system certificate store. When a CA certificate is imported as a Trusted Root CA into the Local Machine store or the Local User store, any certificate signed by the CA is trusted by these browsers. This can also be done using the Microsoft Certutil command-line utility with the following command:

certutil -addstore -f -enterprise -user root dpi-ssl.crt > NUL

The process can be automated via Group Policy and other such means. Refer this KB article for a detailed description of the process using Group Policy:

UTM: Distributing the Default SonicWall DPI-SSL CA certificate to client computers using Group Policy

Here is a third-party blog on how to distribute Root CA certificates as an exe file: How to distribute root certificates as exe files

Mozilla Firefox, on the other hand, has its own certificate store and Root CA certificates must be imported manually into this store. Alternatively, this can be done using the NSS Certutil utility with the following command:

certutil -A -n "CN=SonicWall Firewall DPI-SSL" -t C -d C:Users<username>AppDataRoamingMozillaFirefoxProfiles<first-part-of-the-name-of-the-folder>.default -i dpi-ssl.crt

The above command assumes

- you are either running certutil.exe from its folder or certutil is a global system variable
- the name of the profiles folder varies with each PC
- the name of the SonicWall DPI-SSL certificate is dpi-ssl.crt

Note: The utilities cited here are third-party applications and are referred here only as one of possibly many solutions for automatic deployment of Root CA certificates. SonicWall is not responsible for the functioning, or non-functioning for that matter, of these utilities.