Do not purchase any certificates as you will likely receive a Server Certificate (not a Root Certificate).
If a trusted CA were to provide you with a Root signed by Verisign for example, you can in turn compete with their business and start signing/selling Server Certificates. There is no way that they can control what you would sign. You can start signing fradulent certificates and there is nothing that they can do to stop you other than revoking it which browsers do not check by default.
I have yet to see anybody get a Root signed by a trusted CA. If anybody has obtained one, please do let me know.
The only known ways to obtain a Root for the HTTPS proxy is to either:
a) generate one
b) extract it/generate it from an internal trusted CA.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...