Example Of Trustedca.pem File; Example Of Portal.pem File - Juniper SECURITY THREAT RESPONSE MANAGER 2008.2 - MANAGING VULNERABILITY ASSESSMENT V1 Manual

Managing vulnerability assessment
Table of Contents

Advertisement

34
M
F
S
ANAGING
OUND
Step 5
Example Of
TrustedCA.pem File
Example of
Portal.pem File
S
CAN
CANNERS
Alias name: portal.pem
Creation date: Mar 8, 2007
Entry type: keyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=Foundstone Enterprise Manager
Issuer: CN=Foundstone CA
Serial number: 2
Valid from: Fri Sep 12 20:36:54 ADT 2003 until: Mon Oct 20
20:36:54 ADT 2008 Certificate fingerprints:
MD5:
SHA1:
3A:B4:9C:59:D0:AD:26:C9:6D:B9:05:E9:F1:33:CB:23:F2:0A:E7:26
*******************************************
*******************************************
Repeat for all managed hosts in your deployment, which will host the VIS.
-----BEGIN CERTIFICATE-----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-----END CERTIFICATE-----
-----BEGIN RSA PRIVATE KEY-----
MIICXgIBAAKBgQC5DOnQtMtDXAHth/4M/lI9gVlyoch9EYvCiAsZmtO2JMTjEDse
mH0DQkxSKv0gvsCqKXHx6nNegyyiCM1GuEDvFYPCI5FrkrzEwtndTILGXT5asDXu
SbPTMrBKR5pfMJoPJ/Sjc0vf6A48Nn8FiYLDiyBLKhunzM03EZ22VrZxBwIDAQAB
AoGARZfkqzgDJZ8JnpJBahOPTFBEGodbhiW+IPfW7Nc8fcjQPvDQuw3wHfSmDVTb
g6AZhyU1FBzvLIE6nOmggdMzn9KIN8WMD+XDAAR4AaWOGkN18Ib4h1VVnsa90hYS
ncnAl/9am4jAhADDPFb9ZRMoE6aFE13XD21o49gJG4sH+VkCQQDrf6OGfnR6YaYz
4QFLQzPOQz4bN+vIFLWBZX2r6gCDlPkLfZEYijnycbtJdmATccSf9qLOt9VP28y+
Managing Vulnerability Assessment
0A:CD:06:36:B2:ED:62:8C:98:8D:10:3C:99:95:BA:7D

Advertisement

Table of Contents
loading

This manual is also suitable for:

Security threat response manager

Table of Contents