Verifying A Certificate - ZyXEL Communications UAG5100 User Manual

Unified access gateway
Hide thumbs Also See for UAG5100:
Table of Contents

Advertisement

• Binary PKCS#12: This is a format for transferring public key and private key certificates. The
private key in a PKCS #12 file is within a password-encrypted envelope. The file's password is not
connected to your certificate's public or private passwords. Exporting a PKCS #12 file creates this
and you must provide it to decrypt the contents when you import the file into the UAG.
Note: Be careful not to convert a binary file to text during the transfer process. It is easy
for this to occur since many programs use text files by default.

44.1.3 Verifying a Certificate

Before you import a trusted certificate into the UAG, you should verify that you have the correct
certificate. You can do this using the certificate's fingerprint. A certificate's fingerprint is a message
digest calculated using the MD5 or SHA1 algorithm. The following procedure describes how to check
a certificate's fingerprint to verify that you have the actual certificate.
Browse to where you have the certificate saved on your computer.
1
Make sure that the certificate has a ".cer" or ".crt" file name extension.
2
Figure 316 Remote Host Certificates
Double-click the certificate's icon to open the Certificate window. Click the Details tab and scroll
3
down to the Thumbprint Algorithm and Thumbprint fields.
Figure 317 Certificate Details
Chapter 44 Certificates
UAG Series User's Guide
469

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Uag2100Uag4100

Table of Contents