TMS zl Management and Configuration Guide ST.1.0.090213
7-41
Virtual Private Networks
IPsec VPNs
d. For Select Private Key, type the path and filename for the private key.
Alternatively, click Browse and navigate to the private key file.
e. Click Apply.
The private key is displayed in the VPN > Certificates > IPsec Certifi-
cates window.
f. Delete the private key from your management workstation.
6. Next, create a certificate request. In the VPN > Certificates > IPsec Certifi-
cates window, click Generate Certificate Request.
Figure 7-25. Generate Certificate Request Window
7. For Certificate Name, type a descriptive alphanumeric string. The name
must be unique for this request.
8. For Signature Algorithm, select the algorithm used to sign the certificate:
• MD5 with RSA
• SHA-1 with RSA
• SHA-1 with DSA
You must select the same algorithm that is used by the private key. That
is, select MD5 with RSA or SHA-1 with RSA for an RSA key; select SHA-1
with DSA for a DSA key.