Manage Users, Authentication, and VPN Certificates
311
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
3.
Click the
Generate
table button. A new SCR is created and added to the Self Certificate
Requests table.
4.
In the Self Certificate Requests table, click the
View
table button in the Action
column to
view the new SCR. The Certificate Request Data screen displays:
Figure 190.
Hash Algorithm
From the drop-down list, select one of the following hash algorithms:
•
MD5
. A 128-bit (16-byte) message digest, slightly faster than SHA-1.
•
SHA-1
. A 160-bit (20-byte) message digest, slightly stronger than MD5.
Signature Algorithm
Although this seems to be a drop-down list, the only possible selection is RSA. In
other words, RSA is the default to generate a CSR.
Signature Key Length
From the drop-down list, select one of the following signature key lengths in bits:
• 512
• 1024
• 2048
Note:
Larger key sizes might improve security, but might also decrease
performance.
Optional Fields
IP Address
Enter your fixed (static) IP address. If your IP address is
dynamic, leave this field blank.
Domain Name
Enter your Internet domain name, or leave this field blank.
E-mail Address
Enter the email address of a technical contact in your
company.
Table 77.
Generate self-signed certificate request settings (continued)
Setting
Description