![Amit IOG761 User Manual Download Page 165](http://html.mh-extra.com/html/amit/iog761/iog761_user-manual_2933376165.webp)
Industry Cellular Gateway
3.5.2 My Certificate
My Certificate includes a Local Certificate List. Local Certificate List shows all generated certificates by the root
CA for the gateway. And it also stores the generated Certificate Signing Requests (CSR) which will be signed by
other external CAs. The signed certificates can be imported as the local ones of the gateway.
Self-signed Certificate Usage Scenario
Scenario Application Timing
When the enterprise gateway owns the root CA and VPN tunneling function, it can generate its own
local certificates by being signed by itself or import any local certificates that are signed by other
external CAs. Also import the trusted certificates for other CAs and Clients. In addition, since it has
the root CA, it also can sign Certificate Signing Requests (CSR) to form corresponding certificates for
others. These certificates can be used for two remote peers to make sure their identity during
establishing a VPN tunnel.
Scenario Description
Gateway 1 generates the root CA and a local certificate (HQCRT) signed by itself. Import a trusted
certificate (BranchCRT) –a BranchCSR certificate of Gateway 2 signed by root CA of Gateway 1.
Gateway 2 creates a CSR (BranchCSR) to let the root CA of the Gateway 1 sign it to be the
BranchCRT certificate. Import the certificate into the Gateway 2 as a local certificate. In addition,
also import the certificates of the root CA of the Gateway 1 into the Gateway 2 as the trusted ones.
(Please also refer to following two sub-sections)
Establish an IPSec VPN tunnel with IKE and X.509 protocols by starting from either peer, so that all
165