Page 86 / 137 Scroll up to view Page 81 - 85
6.12 Certificate
A certificate is a public key, attached with its owner’s information (company name,
server name, personal real name, contact e-mail, postal address, etc) and digital
signatures. There will be one or more digital signatures attached on the certificate,
indicating that these signers have verified that the owner information of this
certificate is correct.
85
Page 87 / 137
6.12.1
Local
Click
Create Certificate Request
to generate a certificate signing request. The
certificate signing request can be submitted to the vendor/ISP/ITSP to apply for a
certificate. Some information must be included in the certificate signing request.
Actually, your vendor/ISP/ITSP will ask you to provide the information they require
and to provide the information in the format they regulate. The explanation for each
column in the following table is only for reference.
Certificate Name
A user-defined name for the certificate.
Common Name
Usually, it is the fully qualified domain name for the machine.
Organization Name
The exact legal name of your organization. Do not abbreviate.
State/Province Name The state or province where your organization is located. It
cannot be abbreviated.
Country/Region
Name
The two-letter ISO abbreviation for your country.
86
Page 88 / 137
Click
Apply
to generate a private key and a certificate signing request.
This page is used to paste the certificate content and the private key provided by
your vendor/ISP/ITSP.
87
Page 89 / 137
6.12.2
Trusted CA
CA is the abbreviation for Certificate Authority. CA is a part of the X.509 system. It
is itself a certificate, attached with the owner information of this certificate authority.
But its purpose is not to do encryption/decryption. Its purpose is to sign and issue
certificates; in order to prove the owner information of that certificate is correct.
Click
Import Certificate
to paste the certificate content of your trusted CA.
Generally speaking, the certificate content will be provided by your vendor/ISP/ITSP
and is used to authenticate the Auto-Configuration Server (ACS) that the CPE will
connect to.
88
Page 90 / 137
Chapter 7 Wireless
The Wireless dialog box allows you to enable the wireless capability, hide the access
point, set the wireless network name and restrict the channel set.
7.1 Wireless Basic Screen
The Basic option allows you to configure basic features of the wireless LAN interface.
You can enable or disable the wireless LAN interface, hide the network from active
scans, set the wireless network name (also known as SSID) and restrict the channel
set based on country requirements.
Click
Apply
to configure the basic wireless options.
89

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top