Godaddy Wildcard Certificates on Barracuda Load Balancer

Blog, Information Technology, Load Balancing, Networking, Uncategorized

I decided to write a blog post about how to add a wildcard certificate to a Barracuda load balancer because there is zero documentation online on how to do this. Hopefully by doing this I will save some poor network admin hours of google searching or having to talk to Barracuda tech support. In this blog post, I am assuming you have already purchased a wildcard certificate from godaddy.

The first thing you need to do is log on to your barracuda. Navigate to Basic>Certificates and click “Create Certificate.” This will generate your CSR which you need to upload to godaddy.

 

 

 

 

 

 

 

 

 

Fill out all of the fields and click “Generate Certificate” (Make sure the Key Size is 2048 and also make sure the CSR doesn’t expire before the certificate does.)

Once you have generated the CSR, click the CSR link under download for the Certificate that you’ve just created. This will download the certificate you your computer.


Open the downloaded file in a text editor and copy the text to your clipboard. It should look something like this

—–BEGIN CERTIFICATE REQUEST—–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—–END CERTIFICATE REQUEST—–

Log into the godaddy account. Once you are logged in, click the black “My Account” button, expand “SSL Certificates” and click “Launch.”

A new tab will open with a list of all of the certificates. Choose the right certificate and click the link.

Click “Re-Key” and paste in the CSR code generated from before.  After you have pasted the key, click the black “Re-Key” button and the window will disappear. On the certificate page, choose “Other” and click “Download.”

Extract the zip file to a folder.

Go back to the barracuda and download the generated certificate (Basic > Certificates>Certificate)

 

 

 

 

 

 

 

 

On the save token page, enter a secure password, click Save and store it somewhere on your computer. You will need to know this password for later.

We need to convert this new .pfx file to a .pem format. If you already have OpenSSL on your machine, you may skip this step.

Go to http://slproweb.com/products/Win32OpenSSL.html and download the latest Win32 OpenSSL Light. Install it on your machine and add the directory to your Environment Variable Path. (Click “Start” > right click “My Computer” and click “Properties”> Click “Advanced System Settings” > click “Environment Variables” > Under “System Variables” scroll down to “Path” and double-click > Go to the end of the “Variable value” and add the path of your open SSL installation ex: C:\OpenSSL-Win32\bin and hit OK, OK, OK. )

 

 

 

 

 

We need to convert the PFX to a PEM in order for the barracuda to read the file. Open you command prompt, change directories to the location of the .pfx file and run this command.

openssl pkcs12 -in certificate_name.pfx -out certificate.cer –nodes

Where certificate_name is the name of the .pfx file you downloaded from the barracuda.

Enter the password you used to download the file and hit enter. There will now be a file called “certificate.cer” in the directory with the PFX file.

 

 

 

 

 

 

 

 

 

Open certificate.cer with a text editor. Look for the line that says “—–BEGIN PRIVATE KEY—–” copy all the way to the line that says “—–End Private Key—–“. Open a new notepad and paste the contents that you just copied. You should have something that looks like this…

—–BEGIN PRIVATE KEY—–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—–END PRIVATE KEY—–

Save the file as private.txt.

Open a new notepad, paste the same content you did for private.txt except this time we are going to add to the end of the file the text from our crt file we downloaded from godaddy. In my case it was domain.net.crt. The new text file should look something like this…

—–BEGIN RSA PRIVATE KEY—–
(the private key, several lines of indecipherable text with no spaces)
—–END RSA PRIVATE KEY—–
—–BEGIN CERTIFICATE—–
(the signed certificate, several lines of indecipherable text with no spaces)
—–END CERTIFICATE—–

Save the file as your domain underscore TLD dot pem. So for me it would be domain_net.pem.

Now open up the barracuda web interface and go to the certificates page (Basic > Certificates) and upload the certificate to the load balancer.

Certificate Name: Give it a name
Certificate Key: Private.txt
Signed Certificate: PEM file with both the RSA Private Key + Domain Certificate
Intermediate Certificate (click the + button to show): Godaddy Bundle included in downloaded ZIP file from godaddy (gd_bundle.crt)

That’s it! Now go to your services page and apply the certificate to a service that uses SSL like HTTPS. You can then check you did everything correctly by going to http://www.sslshopper.com/ssl-checker.html