Specifications
Explorers Nur für den internen Gebrauch
A31003-H3580-M103-2-76A9, 01-2009
7-92 HiPath 3000/5000 V8 - HG 1500 V8, Administrator Documentation
hg-07.fm
Security
7.2.6.7 Delete Certificate
You can delete a CA certificate. This is only possible if you have already generated at least one
CA certificate (see Section 7.2.6.4, "Generating CA certificates").
WBM path:
WBM (write access activated with the Padlock icon in the control area?) > Explorers > Security
> (double-click) SSL > (double-click) Certificate Generation > (right-click) selected CA certifi-
cate > Delete Certificate
A warning appears. The name of the certificate is also specified for verification purposes.
Click Delete followed by OK in the confirmation mask (save the new configuration status per-
manently with the Save icon in the control area).
7.2.6.8 Export Certificate [X.509]
You can export a CA certificate to a file. This is only possible if you have already generated at
least one CA certificate (see Section 7.2.6.4, "Generating CA certificates").
X.509 is a standard for certificates. The name and the digital signature of the person who is-
sued the certificate are also saved in the certificate. X.509 is part of the X.500 directory service
for world-wide, distributed, and open systems.
WBM path:
WBM > Explorers > Security > (double-click) SSL > (double-click) Certificate Generation >
(right-click) selected CA certificate > Export Certificate [X.509]
The Web browser displays a mask that lets you save the file under a random name and in a
random location. The certificate name is used for the file name.
7.2.6.9 Generating a CA-signed server certificate [PKCS#12]
You can generate a CA-signed server certificate based on a CA certificate. This is only possible
if you have already generated at least one CA certificate (see Section 7.2.6.4, "Generating CA
certificates"). The certificate generated is saved in a PKCS#12 file.
PKCS#12 files (PKCS#12 stands for "Personal Information Exchange Syntax Standard") save
certificates with the private key. A PKCS#12 file therefore contains the necessary data for per-
sonal encryption and decryption.
WBM path:
WBM (write access activated with the Padlock icon in the control area?) > Explorers > Security
> (double-click) SSL > (double-click) Certificate Generation > (right-click) selected CA certifi-
cate > Generate CA-Signed Server Certificate [PKCS#12]