HP ProCurve Threat Management Solution Implementation Guide 2009-05

C-12
Configure VPNs Using the HP ProCurve Threat Management Services zl Module
Configure a Site-to-Site IPsec VPN
Figure C-9. VPN > Certificates > IPsec Certificates Window (Private Key Added)
4. Next, create a certificate request:
a. In the VPN > Certificates > IPsec Certificates window, click Generate Certificate Request.
Figure C-10. Generate Certificate Request Window
5. For Certificate Request Name, type a unique, descriptive alphanumeric string. For this
example, type TMS1.
6. For Signature Algorithm, select the algorithm used to sign the certificate:
MD5 with RSA
SHA-1 with RSA
SHA-1 with DSA
You must select the same algorithm that is used by the private key. That is, select MD5 with
RSA or SHA-1 with RSA for an RSA key; select SHA-1 with DSA for a DSA key. For this
example, select MD5 with RSA.