Multitech RFIPSC-10, RFIPSC-5 Advanced button D, Reference Number E Key Identifier, Key F

Page 19

RFIPSC Quick Start Guide

either saved it in a file or copied the contents of it to the Windows clipboard. In a file, the certificate may be in binary (X.509), PEM (Privacy Enhanced Mail) or HEX format. Pasted from the clipboard, the certificate must be in PEM encoded format.

Advanced button (D)

Opens a dialog box for configuring the socks and proxy settings.

Reference Number (E) (Key Identifier)

The key identifier is used only in connection with the Certificate Management Protocol (CMP). The key identifier is used along with the key to identify the user requesting a certificate.

Key (F)

This selection is used only in connection with the CMP protocol. The Key selected is a shared secret granted by the certification authority to be used in the certification request. This Key is used for verification of the user requesting a certificate.

Off-line Certification Request

An off-line certification request is simply a file, where the request is stored for later use.

Figure 10: Off-line request: specifying where the request file is to be temporarily stored.

The request is of PKCS#10 format and saved in Privacy Enhanced Mail (PEM) encoded format.

To complete the enrollment, you must deliver the request to the certification authority. You might save the request on a floppy disk and deliver the floppy to the authority, or

19

Image 19
Contents Quick Start Guide Page Trademarks Page Contents Figures Product Description IntroductionInternet Protocol Security IPSec Internet Protocol IPAbout this Manual and Related Manuals Ship Kit ContentsPage Introduction Pre-Installation RequirementsStarting the SSH Sentinel Installation Licensing Agreement Authentication Key Generation Generating the Authentication Key Identity Information Sentinel uses Choose the Enrollment MethodCA Certificate C Online Enrollment InformationEnrollment Protocol a CA Server Address BOff-line Certification Request Advanced button DReference Number E Key Identifier Key FEncryption Speed Diagnostics Completing the Installation Host to Net Setup SSH IPSec Client SetupDefine and enable the following Packet Filter rules RouteFinder ConfigurationSentinel Configuration Click Add to create a new Authentication Key Enter the Preshared Key Information and click OK Select VPN Connection and click OK Screen is displayed Rfipsc Quick Start Guide Click on the Advanced tab Click Details Verify the connection details information and click Close Rfipsc Quick Start Guide Page SSH Sentinel v1.2.0.15 Release Notes SSH Sentinel Installation NotesRemoving SSH Sentinel Updating SSH SentinelOn-line Warranty Registration Limited WarrantyContacting Tech Support via E-mail Recording RouteFinder InformationMulti-Tech on the Internet Ordering Accessories ServiceSupplyNet On-line Ordering Instructions Appendix a RFIPSC-5/10/50 Client Software CD Page Rfipsc Quick Start Guide Page Appendix B Multi-User Software License Agreement Licensee also agrees to the following Multi-User Limited Warranty and License Agreement Page Register Your Software Page Register Your Software Page Rfipsc Quick Start Guide 82013151 B