Specifications
hg-07.fm
A31003-H3580-M103-2-76A9, 01-2009
HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
7-53
Nur für den internen Gebrauch
Explorers
Security
When all settings are complete, click Generate Certificate. The Web browser displays a mask
that lets you save the certificate file under a random name and in a random location. The cer-
tificate name is used for the file name.
You must activate the configuration for the changes to become effective in the configuration –
see Section 7.2.5.2, "Activate the Configured VPN Tables".
7.2.5.12 Generating Certificate Revocation Lists (CRLs)
You can manage a list of revoked certificates and set the revocation duration.
WBM path:
WBM (write access activated with the Padlock icon in the control area?) > Explorers > Security
> (double-click) VPN > (double-click) Lightweight CA > (right-click) selected certificate > Gene-
rate Certificate Revocation List (CRL)
The Generate Certificate Revocation List (CRL) mask is displayed.
Click Add Certificate to List to add a certificate to the list of certificates to be revoked.
Click Delete Selected Certificates from List to remove the selected lines from the list of certifi-
cates to be revoked. You can mark lines by activating the checkbox in front of the line.
You can edit the following fields:
● Timestamp of this CRL Update: In this fields, enter the modification timestamp for the cer-
tificate revocation list.
● Timestamp of next CRL Update: In this field, enter the latest time at which the certificate
revocation list will become invalid and have to be replaced by a new certificate revocation
list.
● List of the Certificates to be Revoked: In these fields, enter the time at which each certifi-
cate should be revoked. You should also select a reason for revocation. For example, Key
Compromise if the key has been revealed to anyone other than its owner.
When all settings are complete, click Generate Certificate Revocation List (CRL). The Web
browser displays a mask that lets you save the certificate revocation list as a file under a ran-
dom name and in a random location. The certificate name used to activate the function is en-
tered as the default file name.
You must activate the configuration for the changes to become effective in the configuration –
see Section 7.2.5.2, "Activate the Configured VPN Tables".