4.
To add a key pair generated by the CPU, select at
‘Key Pairs’
the
‘Generate’
parameter, select the encryption method in the dialog and click on [Add].
ð
The input dialog is closed and the key pair automatically generated by the CPU
is added.
You can add, rename, define and remove key pairs or certificates by using the following
buttons in the corresponding table entry:
n
: New element - adds a new key pair or certificate.
n
: Delete element - Deletes by clicking on
‘Remove’
the selected key pair respec-
tively certificate or, if selected, the Identity Store.
n
: Details - Shows the detailed view of the corresponding element.
n
: Download - You can download the public key content of a key pair as a PEM file.
–
If a key certificate is available, you can download it as a CRT file.
–
Save the file in a directory of your choice or open the file directly with a suitable
tool.
n
: Rename - depending on the position within a table, you can use this to rename
the corresponding element.
4.9.5.2
Firewall
The CPU is delivered with a preset firewall. The Linux
®
firewall
‘nftables’
is used here. As
described below, you can create rules from predefined basic rules or create your own
new ones.
–
On delivery, the firewall is disabled!
–
Please note that you only have access to the firewall settings as an
administrator!
iC9200 Series
Deployment
Web-based management - WBM > Security
HB700 | CPU | PMC921xEx | en | 23-06
95
Summary of Contents for iC9200 Series
Page 123: ...Notes Data Sheet...