Netgear FVS338 FVS338 Reference Manual - Page 125

Self Certificates, Generate Self Certificate Request

Page 125 highlights

FVS338 ProSafe VPN Firewall 50 Reference Manual Self Certificates Active Self certificates are certificates issued to you by the various Certificate Authorities (CAs) that are available for presentation to peer IKE servers. Each active self certificate is listed in the Active Self Certificates table. The data consists of: • Name. A unique given by you to identify the certificate. • Subject Name. The name which other organizations will see as the Holder (owner) of this Certificate. This should be your registered business name or official company name. Generally, all Certificates should have the same value in the Subject field. • Serial Number. This is the serial number maintained by the CA. It is used to identify the certificate with in the CA. • Issuer Name. The name of the CA which issued the Certificate. • Expiry Time. The date on which the Certificate expires. You should renew the Certificate before it expires. To use a Certificate, you must first generate and request the certificate from the CA from the computer or device that will be using the CA. The Certificate Signing Request (CSR) file must be filled out and submitted to the CA who will then generate a certificate for this device. To request a Certificate from the CA: 1. From the main menu under VPN, select the Certificates submenu. The Certificates screen will display. 2. In the Generate Self Certificate Request, enter the required data: • Name - Enter a name that will identify this Certificate. • Subject - This is the name which other organizations will see as the Holder (owner) of the Certificate. Since this name will be seen by other organizations, you should use your registered business name or official company name. This information must be submitted in the following format: C=, ST=, L=, O=, OU=, CN=. In the following example: C=USA, ST=CA, L=Santa Clara, O=NETGEAR, OU=XX, CN=FVS338) • From the pull-down menus, select the following values: - Hash Algorithm: MD5 or SHA2. - Signature Algorithm: RSA. Virtual Private Networking v1.0, March 2009 5-33

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200

FVS338 ProSafe VPN Firewall 50 Reference Manual
Virtual Private Networking
5-33
v1.0, March 2009
Self Certificates
Active Self certificates are certificates issued to you by the various Certificate Authorities (CAs)
that are available for presentation to peer IKE servers. Each active self certificate is listed in the
Active Self Certificates
table. The data consists of:
Name.
A unique given by you to identify the certificate.
Subject Name
. The name which other organizations will see as the Holder (owner) of this
Certificate. This should be your registered business name or official company name.
Generally, all Certificates should have the same value in the Subject field.
Serial Number
. This is the serial number maintained by the CA. It is used to identify the
certificate with in the CA.
Issuer Name.
The name of the CA which issued the Certificate.
Expiry Time
. The date on which the Certificate expires. You should renew the Certificate
before it expires.
To use a Certificate, you must first generate and request the certificate from the CA from the
computer or device that will be using the CA. The
Certificate Signing Request (CSR)
file must
be filled out and submitted to the CA who will then generate a certificate for this device.
To request a Certificate from the CA:
1.
From the main menu under
VPN
, select the
Certificates
submenu. The
Certificates
screen
will display.
2.
In the
Generate Self Certificate Request,
enter the required data:
Name
– Enter a name that will identify this Certificate.
Subject
– This is the name which other organizations will see as the Holder (owner) of the
Certificate. Since this name will be seen by other organizations, you should use your
registered business name or official company name.
This information must be submitted in the following format: C=
<country>
, ST=
<state>
,
L=
<city>
, O=
<organization>,
OU=
<department>,
CN=
<device name>.
In the
following example: C=USA, ST=CA, L=Santa Clara, O=NETGEAR, OU=XX,
CN=FVS338)
From the pull-down menus, select the following values:
Hash Algorithm: MD5 or SHA2.
Signature Algorithm: RSA.