Management Functions
◼
Firewall Settings
●
Up to 4 IP addresses (or ranges of IP addresses) can be specified for both IPv4 and IPv6.
◼
Registration of Keys and Certificates
●
If you install a key or CA certificate from a computer, make sure that they meet the following requirements:
Format
File extension
Public key algorithm
(and key length)
Certificate signature algorithm
*1
Requirements for the certificate contained in a key are pursuant to CA certificates.
*2
The signature algorithm is available only for SHA1-RSA or SHA256-RSA.
*3
Available only for a generated key and certificate signature request (CSR) or installation from the Remote UI.
*4
Available only when the key algorithm is 1024 bits or more.
*5
Available only for installation from the Remote UI.
●
The machine does not support use of a certificate revocation list (CRL).
Appendix
*1
●
Key: PKCS#12
●
CA certificate: X.509 DER, PEM
●
Key: ".p12", ".pfx"
●
CA certificate: ".cer"
*2
●
RSA (512 bits
, 1024 bits, 2048 bits, 4096 bits)
●
ECDSA (P256, P384, P521)
*3
●
RSA: SHA1
, SHA256, SHA384
*3
●
ECDSA: SHA1
, SHA256, SHA384, SHA512
278
*4
*4
*5
*5
, SHA512
, MD2
, MD5
27WS-05K