
Chapter 14 Certificates 291
Nortel Business Secure Router 222 Configuration — Basics
Table 75 describes the labels in Figure 95.
Table 75 Trusted remote host details
Label Description
Name This field displays the identifying name of this certificate. If you want
to change the name, type up to 31 characters to identify this key
certificate. You can use any character (not including spaces).
Certification Path Click the Refresh button to have this read-only text box display the
end entity’s own certificate and a list of certification authority
certificates in the hierarchy of certification authorities that validate a
certificate’s issuing certification authority. For a trusted host, the list
consists of the end entity’s own certificate and the default self-signed
certificate that the Business Secure Router uses to sign remote host
certificates. Since the Business Secure Router considers its own
self-signed certificate to be a certification authority, the chain of
certificates is complete and the Business Secure Router trusts the
certificate.
Refresh Click Refresh to display the certification path.
Certificate
Information
These read-only fields display detailed information about the
certificate.
Type This field displays general information about the certificate. With
trusted remote host certificates, this field always displays CA-signed.
The Business Secure Router is the Certification Authority that signed
the certificate. X.509 means that this certificate was created and
signed according to the ITU-T X.509 recommendation that defines
the formats for public-key certificates.
Version This field displays the X.509 version number.
Serial Number This field displays the certificate’s identification number given by the
device that created the certificate.
Subject This field displays information that identifies the owner of the
certificate, such as Common Name (CN), Organizational Unit (OU),
Organization (O), or Country (C).
Issuer This field displays identifying information about the default
self-signed certificate on the Business Secure Router that the
Business Secure Router uses to sign the trusted remote host
certificates.
Signature
Algorithm
This field displays the type of algorithm that the Business Secure
Router used to sign the certificate, which is rsa-pkcs1-sha1 (RSA
public-private key encryption algorithm and the SHA1 hash
algorithm).
Valid From This field displays the date that the certificate becomes applicable.
The text displays in red and includes a Not Yet Valid! message if the
certificate has not yet become applicable.
Commentaires sur ces manuels