Page 211 / 404 Scroll up to view Page 206 - 210
VMG8324-B10A / VMG8324-B30A Series User’s Guide
211
C
HAPTER
18
Scheduler Rule
18.1
Overview
You can define time periods and days during which the Device performs scheduled rules of certain
features (such as Firewall Access Control)
in the
Scheduler Rule
screen.
18.2
The Scheduler Rule Screen
Use this screen to view, add, or edit time schedule rules.
Click
Security > Scheduler Rule
to open the following screen.
Figure 126
Security > Scheduler Rule
The following table describes the fields in this screen.
Table 95
Security > Scheduler Rule
LABEL
DESCRIPTION
Add new rule
Click this to create a new rule.
#
This is the index number of the entry.
Rule Name
This shows the name of the rule.
Day
This shows the day(s) on which this rule is enabled.
Time
This shows the period of time on which this rule is enabled.
Description
This shows the description of this rule.
Modify
Click the
Edit
icon to edit the schedule.
Click the
Delete
icon to delete a scheduler rule.
Note: You cannot delete a scheduler rule once it is applied to a certain feature.
Page 212 / 404
Chapter 18 Scheduler Rule
VMG8324-B10A / VMG8324-B30A Series User’s Guide
212
18.2.1
Add/Edit a Schedule
Click the
Add
button in the
Scheduler Rule
screen or click the
Edit
icon next to a schedule rule to
open the following screen. Use this screen to configure a restricted access schedule.
Figure 127
Scheduler Rule: Add/Edit
The following table describes the fields in this screen.
Table 96
Scheduler Rule: Add/Edit
LABEL
DESCRIPTION
Rule Name
Enter a name (up to 31 printable English keyboard characters, not including spaces) for this
schedule.
Day
Select check boxes for the days that you want the Device to perform this scheduler rule.
Time if Day
Range
Enter the time period of each day, in 24-hour format, during which the rule will be enforced.
Description
Enter a description for this scheduler rule.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to exit this screen without saving.
Page 213 / 404
VMG8324-B10A / VMG8324-B30A Series User’s Guide
213
C
HAPTER
19
Certificates
19.1
Overview
The Device can use certificates (also called digital IDs) to authenticate users. Certificates are based
on public-private key pairs. A certificate contains the certificate owner’s identity and public key.
Certificates provide a way to exchange public keys for use in authentication.
19.1.1
What You Can Do in this Chapter
• The
Local Certificates
screen lets you generate certification requests and import the Device's
CA-signed certificates (
Section 19.4 on page 216
).
• The
Trusted CA
screen lets you save the certificates of trusted CAs to the Device (
Section 19.4
on page 216
).
19.2
What You Need to Know
The following terms and concepts may help as you read through this chapter.
Certification Authority
A Certification Authority (CA) issues certificates and guarantees the identity of each certificate
owner. There are commercial certification authorities like CyberTrust or VeriSign and government
certification authorities. The certification authority uses its private key to sign certificates. Anyone
can then use the certification authority's public key to verify the certificates. You can use the Device
to generate certification requests that contain identifying information and public keys and then send
the certification requests to a certification authority.
19.3
The Local Certificates Screen
Click
Security >
Certificates
to open the
Local Certificates
screen. This is the Device’s summary
list of certificates and certification requests.
Figure 128
Security > Certificates > Local Certificates
Page 214 / 404
Chapter 19 Certificates
VMG8324-B10A / VMG8324-B30A Series User’s Guide
214
The following table describes the labels in this screen.
19.3.1
Create Certificate Request
Click
Security
>
Certificates
>
Local Certificates
and then
Create Certificate Request
to
open the following screen. Use this screen to have the Device generate a certification request.
Figure 129
Create Certificate Request
Table 97
Security > Certificates > Local Certificates
LABEL
DESCRIPTION
Private Key is
protected by a
password?
Select the checkbox and enter the private key into the text box to store it on the Device.
The private key should not exceed 63 ASCII characters (not including spaces).
Browse...
Click this to find the certificate file you want to upload.
Import Certificate
Click this button to save the certificate that you have enrolled from a certification
authority from your computer to the Device.
Create Certificate
Request
Click this button to go to the screen where you can have the Device generate a
certification request.
Current File
This field displays the name used to identify this certificate. It is recommended that you
give each certificate a unique name.
Subject
This field displays identifying information about the certificate’s owner, such as CN
(Common Name), OU (Organizational Unit or department), O (Organization or company)
and C (Country). It is recommended that each certificate have unique subject
information.
Issuer
This field displays identifying information about the certificate’s issuing certification
authority, such as a common name, organizational unit or department, organization or
company and country.
Valid From
This field displays the date that the certificate becomes applicable. The text displays in
red and includes a
Not Yet Valid!
message if the certificate has not yet become
applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red and
includes an
Expiring!
or
Expired!
message if the certificate is about to expire or has
already expired.
Modify
Click the
View
icon to open a screen with an in-depth list of information about the
certificate (or certification request).
For a certification request, click
Load Signed
to import the signed certificate.
Click the
Remove
icon to delete the certificate (or certification request). You cannot
delete a certificate that one or more features is configured to use.
Page 215 / 404
Chapter 19 Certificates
VMG8324-B10A / VMG8324-B30A Series User’s Guide
215
The following table describes the labels in this screen.
After you click
Apply
, the following screen displays to notify you that you need to get the certificate
request signed by a Certificate Authority. If you already have, click
Load_Signed
to import the
signed certificate into the Device. Otherwise click
Back
to return to the
Local Certificates
screen.
Figure 130
Certificate Request Created
19.3.2
Load Signed Certificate
After you create a certificate request and have it signed by a Certificate Authority, in the
Local
Certificates
screen click the certificate request’s
Load Signed
icon to import the signed certificate
into the Device.
Table 98
Create Certificate Request
LABEL
DESCRIPTION
Certificate
Name
Type up to 63 ASCII characters (not including spaces) to identify this certificate.
Common Name
Select
Auto
to have the Device configure this field automatically. Or select
Customize
to
enter it manually.
Type the IP address (in dotted decimal notation), domain name or e-mail address in the field
provided. The domain name or e-mail address can be up to 63 ASCII characters. The
domain name or e-mail address is for identification purposes only and can be any string.
Organization
Name
Type up to 63 characters to identify the company or group to which the certificate owner
belongs. You may use any character, including spaces, but the Device drops trailing spaces.
State/Province
Name
Type up to 32 characters to identify the state or province where the certificate owner is
located. You may use any character, including spaces, but the Device drops trailing spaces.
Country/Region
Name
Select a country to identify the nation where the certificate owner is located.
Apply
Click
Apply
to save your changes.
Cancel
Click
Cancel
to exit this screen without saving.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top