During the configuration of the VPN cluster, the certificates used for authentication and establishing SSL connections are issued by our internal certificate authority, GATEWAY_EJBCA. When a certificate—either the one directly issued or any within its certificate chain—approaches its expiration, it must be renewed to maintain secure operations.
There are two possible scenarios:
- The issued certificate itself is nearing expiry.
- One or more certificates in the chain (such as the SUBCA or ROOTCA) are expiring. (SRE team will be renewing these)
In both cases, administrators has to perform the steps below to reconfigure their VPN configuration and generate a new certificate. This document provides the steps on updating the VPN configuration after the renewal of certificates. This affects only customers who have the Cloud Extender VPN module configured.
Updating certificate in standalone VPN configuration:
- Log in to the Cloud Extender server, where VPN is configured.
- Open MaaS360 Config Utility, go to VPN tile, the cluster will be visible.

- Click on Edit icon as highlighted in above screen shot, below screen will appear.

- Make sure to note down all the configuration details from the "Cluster Details" screen.

- Click Next and then click Cancel, you will come back to VPN configuration cluster page.

- Click on the VPN configuration again and delete the existing cluster.

- Create a new cluster from the configuration copied from Step #4 (above) and make sure the "Test" while configuring the VPN is successful.
- Navigate to the directory "C:\ProgramData\MaaS360\Cloud Extender\AR\DATA\VPN" and check for newly created certificate file (details below)

Updating certificate in VPN cluster configuration:
- Follow steps mentioned above in one Cloud Extender server.
- Export the newly generated certificate from the Cloud Extender by copying ca.crt and server.crt from C:\ProgramData\MaaS360\Cloud Extender\AR\DATA\VPN. And import it to another Cloud Extender server by pasting in the file in the same location.
Portal Changes to update VPN configuration:
Administrators have to repeat these below steps (for Android policy as well) if they have both iOS and Android devices configured for VPN.
- Login to the portal and navigate to Policies.
- Click on the policy (which is configured to use VPN) and edit the policy.
- Edit the VPN Connection name (to identify that the cluster configuration is changed)
- Make sure to select the updated cluster name (the one configured above) under the dropdown "Select VPN server".

- Save and publish the policy.
Impact of Verbose Logging on VPN Performance
Recently, it has been observed that some customers have enabled verbose logging for debugging purposes. While this can be helpful for troubleshooting, it has also led to significant performance degradation on devices connecting to the VPN.
Before enabling verbose logging, it is essential to understand the various logging levels available and the potential consequences of using higher verbosity settings. The following section provides an overview of these logging levels and their implications.
Understanding Verbosity Levels in OpenVPN Server Logging
OpenVPN offers robust logging capabilities to assist administrators in troubleshooting, monitoring, and auditing VPN connections. A key parameter that controls the level of detail in the logs is the verb (verbosity) level.
What is the verb Parameter?
The verb parameter in the OpenVPN server (and client) configuration file determines the verbosity level of the logs. This discussion focuses specifically on the OpenVPN server logs.
The verb setting controls how much information OpenVPN writes to the log file or console. The value can range from 0 to 11, where:
|
|
|
No output except for fatal errors.
|
|
Startup messages and important runtime errors.
|
|
Warnings and non-fatal error messages.
|
|
Default level. Basic operational logging, including connections and disconnects.
|
|
Normal operational logging plus some additional info about connection progress.
|
|
Outputs R and W characters to the console for each packet read and write, uppercase is used for TCP/UDP packets and lowercase is used for TUN/TAP packets.
|
|
Extremely detailed debug output, including packet dumps and low-level function calls.
|
|
|
|
|
Default verbose level is 4, setting a very high verbosity in production may result in large log files and potential performance impact.