
Chapter 14 Certificates 285
Nortel Business Secure Router 252 Configuration — Basics
Trusted remote hosts
Click CERTIFICATES, Trusted Remote Hosts to open the Trusted Remote
Hosts screen (see Figure 90). This screen displays a list of the certificates of peers
that you trust but which are not signed by one of the certification authorities on the
Trusted CAs screen.
You do not need to add any certificate that is signed by one of the certification
authorities on the Trusted CAs screen because the Business Secure Router
automatically accepts any valid certificate signed by a trusted certification
authority as being trustworthy.
Certificate in PEM
(Base-64)
Encoded Format
This read-only text box displays the certificate or certification request
in Privacy Enhanced Mail (PEM) format. PEM uses 64 ASCII
characters to convert the binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to
friends or colleagues or you can copy and paste the certificate into a
text editor and save the file on a management computer for later
distribution (through floppy disk for example).
Export Click this button and then Save in the File Download screen. The
Save As screen displays, browse to the location that you want to use
and click Save.
Apply Click Apply to save your changes to the Business Secure Router.
You can only apply changes to the name, set the Business Secure
Router to check the CRL issued by the certification authority before
trusting a certificate issued, or both.
Cancel Click Cancel to quit and return to the Trusted CAs screen.
Table 70 Trusted CA details
Label Description
Comentarios a estos manuales