M2M Cellular Gateway
5.b Certificate
In cryptography, a public key certificate (also known as a digital certificate or identity certificate) is
an electronic document used to prove ownership of a public key. The certificate includes
information about the key, information about its owner's identity, and the digital signature of an
entity that has verified the certificate's contents are genuine. If the signature is valid, and the
person examining the certificate trusts the signer, then they know they can use that key to
communicate with its owner
In a typical public‐key infrastructure (PKI) scheme, the signer is a certificate authority (CA), usually
a company such as VeriSign which charges customers to issue certificates for them. In a web of
trust scheme, the signer is either the key's owner (a self‐signed certificate) or other users
("endorsements") whom the person examining the certificate might know and trust. The device
also plays as a CA role.
Certificates are an important component of Transport Layer Security (TLS, sometimes called by its
older name SSL), where they prevent an attacker from impersonating a secure website or other
server. They are also used in other important applications, such as email encryption and code
signing. Here, it can be used in IPSec tunneling for user authentication.
5.b.1 Configuration
The configuration setting allows user to create Root Certificate Authority (CA) certificate and
configure to set enable of SCEP.
Create root CA
Go to Advanced Network > Certificate > Configuration
When Generate button is applied, Root CA Certificate Configuration screen will appear.
11 Reference: http://en.wikipedia.org/wiki/Public_key_certificate.
Index skipping is used to reserve slots for new function insertion, when required.
11
.
277