VPN
Site-to-Site IPsec VPN
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide
112
6
Certificate Management
A digital certificate certifies the ownership of a public key by the named subject of
the certificate. This allows others (relying parties) to rely upon signatures or
assertions made by the private key that corresponds to the public key that is
certified. In this model of trust relationships, a CA is a trusted third party that is
trusted by both the subject (owner) of the certificate and the party relying upon
the certificate. CAs are characteristic of many public key infrastructure (PKI)
schemes.
The table has a self-signed local certificate by default. All imported CA certificates
and local certificates, as well as the generated CSR, are also shown in the table.
The default local certificate is self-signed, and may be exported, but not deleted. It
is used only by HTTPS GUI access. All other local certificates can be deleted and
exported. The CA certificates can be deleted but not exported. The CSRs can be
deleted and exported. The “Action” column also has an “Import” button for the
CSRs. It is used to import the local certificate that the CA issues based on this
CSR.
Use Certificate Management to generate and install SSL certificates.
To import a certificate:
STEP 1
Select
VPN > Certificate Management
. In the
Certificate Management
table,
click Import Certificate.
STEP 2
Select
Import CA
or
Import Local Certificate
.
STEP 3
Browse and locate certificate. The RV132W/RV134W only support PEM format
certificate. Please make sure the certificate format is PEM and file extension name
is .pem.
STEP 4
Click
Start Upload.
STEP 5
Click
Save.