TRA Security

This section describes the general security configuration requirements for Traffic Routing Agent (TRA). These security requirements apply when virtual servers are defined and specified as secured.

The TRA requires a user-created Privacy Enhanced Mail (PEM)-formatted certificate and private key pair placed in /opt/tra/custom/tra_certificate to communicate with secured clients. That default directory can be changed using the TRA configuration attribute security-own-certificate-path.

The TRA requires trusted certificates to authenticate client connections placed in /opt/tra/custom/trusted_certificates/. That default directory can be changed using the TRA configuration attribute security-trusted-certificates-path.

Important: Apply appropriate access protection to all keys and certificates.

Secured Connection Setup Errors

In the event of a secured transport setup error, the TRA generates error-level messages with diagnostic information, and an SNMP trap tfcSslErrorDetails (object ID: 1.3.6.1.4.1.35838.1.2.1.2.15.2) to alert you to potential threats or configuration problems. The SNMP trap carries string-based diagnostic data that includes the client address and other error information.

For more information about SNMP statistics, see the discussion about MATRIXX Engine SNMP Statistics in MATRIXX Monitoring and Logging.