On this window, you manage IPsec certificates, generate certificate requests, and manage private keys. Installing certificates is the optional Step 2 in configuring an IPsec VPN with IKE and in configuring an L2TP Layer 2 Tunneling Protocol over IPsec VPN. To see detailed instructions for configuring IPsec VPNs on the Threat Management Services (TMS) zl Module (including an explanation for the figure below), click here. To see detailed instructions for configuring L2TP over IPsec VPNs on the TMS zl Module (including an explanation for the figure below), click here. Click the
Submit the certificate request to your CA Certificate Authority. Request that certificate files be returned to you in PEM Privacy Enhanced Mail or DER Distinguished Encoding Rules format. When your CA sends you its CA root certificate, the TMS zl Module’s self certificate, and a CRL Certificate Revocation List, copy the files to your management station. Upload each file as follows:
|