Specifications
Explorers Nur für den internen Gebrauch
A31003-H3580-M103-2-76A9, 01-2009
7-64 HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
hg-07.fm
Security
Click Delete followed by OK in the confirmation mask (save the new configuration status per-
manently with the Save icon in the control area).
7.2.5.34 Exporting a Certificate Signing Requests (CSR)
You can export the data for a generated certificate signing request to another file (see Section
7.2.5.26, "Generating a Certificate Signing Request (CSR)").
WBM path:
WBM > Explorers > Security > (double-click) VPN > (double-click) Certificate Management >
(double-click) Peer Certificates > (right-click) selected certificate signing request (yellow icon)
> Export Certificate Signing Request (CSR)
An operating system download dialog is displayed. Save the file under a random name and in
a random location.
7.2.5.35 Import Certificate for CSR [X.509]
You can import certificates in which the public key matches the CSR’s private key. A certificate
signing request must be generated for this (see Section 7.2.5.26, "Generating a Certificate Si-
gning Request (CSR)").
WBM path:
WBM (write access activated with the Padlock icon in the control area?) > Explorers > Security
> (double-click) VPN > (double-click) Certificate Management > (double-click) Peer Certificates
> (right-click) selected certificate signing request (yellow icon) > Import Certificate for CSR
[X.509]
The Import IPsec Certificate mask is displayed. You can edit the following field:
● File with Certificate: Specify the path and name of the file that contains the certificate data
to be imported. Click Browse... to open a dialog to search for the file.
Click View Fingerprint of Certificate.
A window showing the fingerprint of the certificate to be imported is displayed. Check the fin-
gerprint (= hexadecimal numeral). The fingerprint always changes if a certificate has been
changed. An unchanged fingerprint is the only guarantee that the certificate is authentic. If the
two fingerprints are not identical, an attempted attack has probably occurred. Appropriate mea-
sures should be taken.
Click OK to close the window with the fingerprint.
Click Import Certificate from Fileif you are satisfied with the fingerprint check. Do not import the
certificate if the fingerprint does not meet your expectations.