Chapter 13 Certificates
P-660HWP-D1 User’s Guide
201
13.11 Trusted CA > Import
Click
Security > Certificates > Trusted CAs
to open the
Trusted CAs
screen and then click
Import
to open the
Trusted CA Import
screen. Follow the instructions in this screen to save
a trusted certification authority’s certificate from a computer to the P-660HWP-D1. The P-
660HWP-D1 trusts any valid certificate signed by any of the imported trusted CA certificates.
"
You must remove any spaces from the certificate’s filename before you can
import the certificate.
Subject Alternative
Name
This field displays the certificate’s owner‘s IP address (IP), domain name (DNS)
or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
CRL Distribution
Points
This field displays how many directory servers with Lists of revoked certificates
the issuing certification authority of this certificate makes available. This field
also displays the domain names or IP addresses of the servers.
MD5 Fingerprint
This is the certificate’s message digest that the P-660HWP-D1 calculated using
the MD5 algorithm. You can use this value to verify with the certification
authority (over the phone for example) that this is actually their certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the P-660HWP-D1 calculated using
the SHA1 algorithm. You can use this value to verify with the certification
authority (over the phone for example) that this is actually their certificate.
Certificate in PEM
(Base-64) Encoded
Format
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Back
Click
Back
to go to the previous screen
Export
Click
Export
to send a file containing your certificate details.
Apply
Click
Apply
to save your changes back to the P-660HWP-D1. You can only
change the name and/or set whether or not you want the P-660HWP-D1 to
check the CRL that the certification authority issues before trusting a certificate
issued by the certification authority.
Cancel
Click
Cancel
to quit and return to the
Trusted CAs
screen.
Table 76
Security > Certificates > Trusted CAs > Details (continued)
LABEL
DESCRIPTION
Содержание P-660HWP-D1
Страница 2: ......
Страница 7: ...Safety Warnings P 660HWP D1 User s Guide 7...
Страница 8: ...Safety Warnings P 660HWP D1 User s Guide 8...
Страница 10: ...Contents Overview P 660HWP D1 User s Guide 10...
Страница 20: ...Table of Contents P 660HWP D1 User s Guide 20...
Страница 26: ...List of Figures P 660HWP D1 User s Guide 26...
Страница 31: ...31 PART I Introduction Introducing the P 660HWP D1 33 Introducing the Web Configurator 41...
Страница 32: ...32...
Страница 39: ...Chapter 1 Introducing the P 660HWP D1 P 660HWP D1 User s Guide 39 Figure 7 P 660HWP D1 with ISDN...
Страница 40: ...Chapter 1 Introducing the P 660HWP D1 P 660HWP D1 User s Guide 40...
Страница 54: ...Chapter 2 Introducing the Web Configurator P 660HWP D1 User s Guide 54 Figure 19 System General...
Страница 55: ...55 PART II Wizards Wizard Setup for Internet Wireless Access 57 Bandwidth Management Wizard 69...
Страница 56: ...56...
Страница 72: ...72...
Страница 90: ...Chapter 5 WAN Setup P 660HWP D1 User s Guide 90...
Страница 147: ...147 PART IV Security Firewalls 149 Firewall Configuration 161 Content Filtering 183 Certificates 187...
Страница 148: ...148...
Страница 168: ...Chapter 11 Firewall Configuration P 660HWP D1 User s Guide 168 Figure 93 Firewall Edit Rule...
Страница 182: ...Chapter 11 Firewall Configuration P 660HWP D1 User s Guide 182...
Страница 186: ...Chapter 12 Content Filtering P 660HWP D1 User s Guide 186...
Страница 210: ...210...
Страница 214: ...Chapter 14 Static Route P 660HWP D1 User s Guide 214...
Страница 230: ...Chapter 16 Dynamic DNS Setup P 660HWP D1 User s Guide 230...
Страница 242: ...Chapter 17 Remote Management Configuration P 660HWP D1 User s Guide 242...
Страница 254: ...Chapter 18 Universal Plug and Play UPnP P 660HWP D1 User s Guide 254...
Страница 255: ...255 PART VI Maintenance and Troubleshooting System 257 Logs 263 Tools 281 Diagnostic 287 Troubleshooting 289...
Страница 256: ...256...
Страница 262: ...Chapter 19 System P 660HWP D1 User s Guide 262...
Страница 280: ...Chapter 20 Logs P 660HWP D1 User s Guide 280...
Страница 286: ...Chapter 21 Tools P 660HWP D1 User s Guide 286...
Страница 296: ...296...
Страница 340: ...Appendix D IP Subnetting P 660HWP D1 User s Guide 340...
Страница 344: ...Appendix E Command Interpreter P 660HWP D1 User s Guide 344...
Страница 360: ...Appendix H Legal Information P 660HWP D1 User s Guide 360...
Страница 366: ...Appendix I Customer Support P 660HWP D1 User s Guide 366...
Страница 374: ...Index P 660HWP D1 User s Guide 374...