6- Sign your certificate request using your newly created CA:
Openssl x509 -req -days 365 -in router1.csr -CA cacert.crt -CAkey cakey.pem -CAcreateserial -
out router1.crt
router1.csr – generated self certificate request (router),
cacert.crt – CA certification,
cakey.pem – CA keys,
router1.crt – signed certificate (router).
7- Load CA certificate: "cacert.crt" and your signed certificate: "router1.crt" on your
device. They now should display like this:
8- Reboot your router.
Version 2.0
Need help?
Do you have a question about the DGFV338 - ProSafe Wireless ADSL Modem VPN Firewall Router and is the answer not in the manual?
Questions and answers