<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.sophos.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:wfw="http://wellformedweb.org/CommentAPI/"><channel><title>Is my self-signed VPN setup correctly?</title><link>https://community.sophos.com/utm-firewall/f/utm-managed-endpoint/99602/is-my-self-signed-vpn-setup-correctly</link><description>Hello all, 
 I&amp;#39;m looking for a quick review of my SSL VPN setup and something that keeps going over in my head. 
 My UTM setup is: 
 I have both a public recognized cert as well as self signed. My public X509 is issued to *.domain.com wildcard and is</description><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>RE: Is my self-signed VPN setup correctly?</title><link>https://community.sophos.com/thread/362067?ContentTypeID=1</link><pubDate>Wed, 17 Jan 2018 14:09:39 GMT</pubDate><guid isPermaLink="false">4be5eb7d-caa4-4ff5-8e60-8f9463545a35:06c526ba-6add-42d8-a84b-fa31f0f79471</guid><dc:creator>BAlfson</dc:creator><description>&lt;p&gt;Salut Aaron and welcome to the UTM Community!&lt;/p&gt;
&lt;p&gt;I would think that a self-signed CA would be more secure that a publically-signed CA.&amp;nbsp; Consider that you have to import&amp;nbsp;the HTTPS Signing CA&amp;nbsp;certificate into&amp;nbsp;your browsers to avoid SSL warning messages because&amp;nbsp;the Proxy uses a&amp;nbsp;self-signed cert.&lt;/p&gt;
&lt;p&gt;Cheers - Bob&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;</description></item></channel></rss>