HP TMS zl Module Security Administrator's Guide
4-428
Configuring a VPN on the HP TMS zl Module
Manage Certificates
3. The window is slightly different depending whether you have selected
multiple modules. If you have, you must select each module in the
Available Devices list and configure the settings for that module individu-
ally.
Figure 4-329. Manage Certificates Wizard > Retrieve IPsec certificate through
SCEP Window
4. For Subject Name, typically you type the TMS zl Module’s FQDN after /CN=.
The remote tunnel endpoint will use this subject name to authenticate the
module. Therefore, the subject name must match a remote ID that is
configured on the remote endpoint. You should also specify this name for
the local ID value in the IKE policy (the type is Distinguished Name).
5. For Trusted Certificate to verify Certificate, select the CA root certificate that
you retrieved.
6. For Certificate Type, select RSA-MD5 or RSA-SHA-1.
This setting determines the algorithm for the private key. You should have
selected RSA Signature for Authentication Method in the IKE policy.
7. For Encryption Algorithm, select 3DES or DES.
8. For Challenge Password, type the password that your CA has given you.