Certificate Management - Cisco RV132W Administration Manual

Table of Contents

Advertisement

VPN
Site-to-Site IPsec VPN
STEP 1
STEP 2
STEP 3
STEP 4
STEP 5
Cisco RV132W ADSL2+ Wireless-N and RV134W VDSL2 Wireless-AC VPN Router Administration Guide

Certificate Management

A digital certificate certifies the ownership of a public key by the named subject of
the certificate. This allows others (relying parties) to rely upon signatures or
assertions made by the private key that corresponds to the public key that is
certified. In this model of trust relationships, a CA is a trusted third party that is
trusted by both the subject (owner) of the certificate and the party relying upon
the certificate. CAs are characteristic of many public key infrastructure (PKI)
schemes.
The table has a self-signed local certificate by default. All imported CA certificates
and local certificates, as well as the generated CSR, are also shown in the table.
The default local certificate is self-signed, and may be exported, but not deleted. It
is used only by HTTPS GUI access. All other local certificates can be deleted and
exported. The CA certificates can be deleted but not exported. The CSRs can be
deleted and exported. The "Action" column also has an "Import" button for the
CSRs. It is used to import the local certificate that the CA issues based on this
CSR.
Use Certificate Management to generate and install SSL certificates.
To import a certificate:
Select VPN > Certificate Management. In the Certificate Management table,
click Import Certificate.
Select Import CA or Import Local Certificate.
Browse and locate certificate. The RV132W/RV134W only support PEM format
certificate. Please make sure the certificate format is PEM and file extension name
is .pem.
Click Start Upload.
Click Save.
6
112

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rv134w

Table of Contents