
292
Chapter 14 Certificates
NN47922-500
Valid To
This field displays the date that the certificate expires. The text
displays in red and includes an Expiring! or Expired! message if the
certificate is about to expire or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate
the certificate’s key pair (the Business Secure Router uses RSA
encryption) and the length of the key set in bits (1 024-bits, for
example).
Subject Alternative
Name
This (optional) field displays the certificate owner‘s IP address (IP),
domain name (DNS), or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be
used. For example, DigitalSignature means that the key can be used
to sign certificates and KeyEncipherment means that the key can be
used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For
example, Subject Type=CA means that this is a certification
authority’s certificate and Path Length Constraint=1 means that there
can only be one certification authority in the certificate’s path.
MD5 Fingerprint
This is the certificate’s message digest that the Business Secure
Router calculated using the MD5 algorithm. You cannot use this
value to verify that this is the remote host’s actual certificate because
the Business Secure Router has signed the certificate; thus causing
this value to be different from that of the remote host’s actual
certificate. See
“Verifying a certificate of a trusted remote host” on
for how to verify a remote host’s certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the Business Secure
Router calculated using the SHA1 algorithm. You cannot use this
value to verify that this is the remote host’s actual certificate because
the Business Secure Router has signed the certificate; thus causing
this value to be different from that of the remote host’s actual
certificate. See
“Verifying a certificate of a trusted remote host” on
for how to verify a remote host’s certificate.
Certificate in PEM
(Base-64)
Encoded Format
This read-only text box displays the certificate or certification request
in Privacy Enhanced Mail (PEM) format. PEM uses 64 ASCII
characters to convert the binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to
friends or colleagues or you can copy and paste the certificate into a
text editor and save the file on a management computer for later
distribution (via floppy disk for example).
Export
Click this button and then
Save
in the
File Download
screen. The
Save As
screen displays. Browse to the location that you want to
use and click
Save
.
Table 75
Trusted remote host details
Label
Description
Содержание BSR222
Страница 28: ...28 Tables NN47922 500 ...
Страница 50: ...50 Chapter 2 Introducing the WebGUI NN47922 500 ...
Страница 66: ...66 Chapter 3 Wizard setup NN47922 500 ...
Страница 87: ...Chapter 5 System screens 87 Nortel Business Secure Router 222 Configuration Basics Figure 17 Time and Date ...
Страница 92: ...92 Chapter 5 System screens NN47922 500 ...
Страница 96: ...96 Chapter 6 LAN screens NN47922 500 Configuring IP Click LAN to open the IP screen Figure 19 LAN IP ...
Страница 104: ...104 Chapter 6 LAN screens NN47922 500 ...
Страница 115: ...Chapter 7 WAN screens 115 Nortel Business Secure Router 222 Configuration Basics Figure 27 WAN IP ...
Страница 123: ...Chapter 7 WAN screens 123 Nortel Business Secure Router 222 Configuration Basics Figure 32 Dial Backup Setup ...
Страница 154: ...154 Chapter 9 Static Route screens NN47922 500 ...
Страница 196: ...196 Chapter 11 Firewall screens NN47922 500 ...
Страница 212: ...212 Chapter 13 VPN NN47922 500 Figure 68 Summary IP Policies ...
Страница 223: ...Chapter 13 VPN 223 Nortel Business Secure Router 222 Configuration Basics Figure 72 VPN Branch Office rule setup ...
Страница 249: ...Chapter 13 VPN 249 Nortel Business Secure Router 222 Configuration Basics Figure 79 VPN Client Termination ...
Страница 256: ...256 Chapter 13 VPN NN47922 500 Figure 82 VPN Client Termination advanced ...
Страница 260: ...260 Chapter 13 VPN NN47922 500 ...
Страница 264: ...264 Chapter 14 Certificates NN47922 500 Figure 84 My Certificates ...
Страница 273: ...Chapter 14 Certificates 273 Nortel Business Secure Router 222 Configuration Basics Figure 87 My Certificate details ...
Страница 281: ...Chapter 14 Certificates 281 Nortel Business Secure Router 222 Configuration Basics Figure 90 Trusted CA details ...
Страница 290: ...290 Chapter 14 Certificates NN47922 500 Figure 95 Trusted remote host details ...
Страница 314: ...314 Chapter 16 IEEE 802 1x NN47922 500 ...
Страница 318: ...318 Chapter 17 Authentication server NN47922 500 Figure 107 Local User database edit ...
Страница 326: ...326 Chapter 17 Authentication server NN47922 500 ...
Страница 374: ...374 Chapter 20 Logs Screens NN47922 500 Figure 151 Log settings ...
Страница 384: ...384 Chapter 20 Logs Screens NN47922 500 ...
Страница 390: ...390 Chapter 21 Call scheduling screens NN47922 500 Figure 158 Applying Schedule Sets to a remote node ...
Страница 402: ...402 Chapter 22 Maintenance NN47922 500 Figure 170 Restart screen ...
Страница 422: ...422 Appendix A Troubleshooting NN47922 500 ...