Sign in to the Smoothwall On-Premise Appliance Admin UI and check your dashboard for a banner referencing certificates.
- If no banner appears, or if you see a banner that says ‘Warning: The Guardian CA certificate will expire in X days.’, see Renew when the Guardian CA certificate will expire soon.
- If you see a banner that says ‘Warning: The Guardian CA certificate has expired.’, your certificates have expired.
When your certificates expire:
- Users can’t connect to the internet.
- You can’t apply Web Filtering policies that use HTTPS inspection.
- You can’t access the On-Premise Appliance Admin UI using HTTPS.
Renew your certificates and install the new certificates on devices immediately.
If you’re unsure about any of the steps, contact Smoothwall Support for guidance through the process.
Image 1: Banner when the certificate has expired.
Note
- The Warning banner will remain until the morning after you renew.
- While you complete the steps below, expect your browser to display security errors. These are normal and don’t indicate a problem or fault.
- If you have a centrally managed setup or a Failover setup, make the changes to CAs and certificates on the parent Smoothwall Appliance.
Renew only Dynamic Certificates
Follow these instructions if only the Dynamic certificates have expired, but the Root CA is still valid. The Certificate column shows:
- ‘Expires’ with a future date for the Root CA expiry.
- ‘Expired’ with a date today or in the past for the Dynamic certificates.
Image 1: Example setup where the Dynamic certificates have expired, but the Root CA is still valid.
To renew the Dynamic Certificates:
- Back up your settings.
- Create a new CA and name it 'Junk CA' or similar - you’ll only use this temporarily.
- Set the new Junk CA as the Default CA.
- Set the original Root CA as the Default CA again. This action regenerates the Dynamic Certificates with the shorter of the two periods:
- An additional 13 months of validity.
- The remaining validity period of the CA.
- Go to System > Certificates > Certificates for Services, hover over the Junk CA and select Delete.
- Test HTTPS services.
Image 2: Example setup after renewing Dynamic Certificates to match the Root CA expiry date.
Renew Root CA with Dynamic Certificates
Follow these instructions if the Root CA has already expired. The Root CA shows Not present in the Certificate and Key columns, and the Dynamic certificates show as Expired.
Image 3: Root CA and Dynamic Certificates have expired.
Step 1: Back up your settings
- Back up your Smoothwall settings.
- Create a system restore point:
- Go to System > Maintenance > System Restore.
- Select New restore point.
- Name the restore point.
- Select Save.
Step 2: Create a New Root CA
- Create a new CA.
- If needed, create Intermediate Certificates and Certificate Authorities to deploy a certificate chain of trust without deploying the Root CA.
Step 3: Export and deploy the new CA
- Export the CA.
- Deploy the CA on every device in one of the following ways:
- Automatically (recommended): For domain-joined and BYO devices, use your preferred MDM solution for example, the Google Admin Console, or an Active Directory Group Policy. This option lets you prepare devices before you swap the Default Root CA.
- Manually: Complete Step 4, then install the new Root CA using the getcert page.
Step 4: Set a New 'Default' Root CA
Set your new CA (or any Intermediate CA you’ve created) as the 'Default CA' to create Dynamic certificates and migrate services. See Set a new Default Certificate Authority.
Note
If you have a centrally managed setup or a Failover setup, most settings and aspects of certificates are copied over as part of the replication profile. However, it doesn’t automatically update the Default certificate, so you must change the Default certificate on each child or Failover Smoothwall.
(Optional) Step 5: Set up Intermediate certificates
If you use Intermediate Certificates, create any Intermediate CAs needed using the new Root CA.
Step 6: Test HTTPS services
Make sure HTTPS services work as expected after the Certificate change:
- Use a test computer.
- Open a browser.
- Go to any HTTPS website, such as google.com or bbc.co.uk
- If you have set up Certificates correctly, you can access the website (unless a Web Filter Policy blocks it).
- If you see a security error like the one below, review your configuration.
Image 4: Example “connection not secure” message indicating Certificate setup issues.