TMS zl Management and Configuration Guide ST.1.0.090213
7-51
Virtual Private Networks
IPsec VPNs
14. For Trusted Certificate to verify Certificate, select the CA root certificate that
you installed in step 10.
15. For Certificate Type, select RSA-MD5 or RSA-SHA-1.
This setting determines the algorithm for the private key. You should have
selected RSA Signature for Authentication Method in the IKE policy.
16. For Encryption Algorithm, select 3DES or DES.
17. For Challenge Password, type the password that your CA has given you.
A challenge password is typically used to revoke a certificate, but your
CA may also require you to enter a challenge password to request a
certificate. If your CA does not require a password, leave this box empty.
18. For Identifier to store Private Key, type a string between 1 and 31 alphanu-
meric characters. The string must be unique to this private key.
19. For Key Size, select 512, 1024, or 2048, which determines the length of the
key in bits.
20. Click Apply.
After the CA returns the certificate, the certificate and the private key are
displayed in the VPN > Certificates > IPsec Certificates window.
Figure 7-42. VPN > Certificates > IPsec Certificates (Certificate Installed)