Management Functions
◼
Firewall Settings
●
Up to 4 IP addresses (or ranges of IP addresses) can be specified for both IPv4 and IPv6.
●
Up to 10 MAC addresses can be specified.
◼
Registration of Keys and Certificates
●
If you install a key or CA certificate from a computer, make sure that they meet the following requirements:
Format
File extension
Public key algorithm
(and key length)
Certificate signature algorithm
Certificate thumbprint algorithm SHA1
*1
The signature algorithm is available only for SHA1-RSA or SHA256-RSA.
*2
Available only for a generated key and certificate signature request (CSR) or installation from the Remote UI.
*3
Available only when the key algorithm is 1024 bits or more.
*4
Available only for installation from the Remote UI.
●
The machine does not support use of a certificate revocation list (CRL).
Appendix
●
PKCS#12
●
CA certificate: X.509 DER, PEM
●
Key: ".p12", ".pfx"
●
CA certificate: ".cer"
*1
RSA (512 bits
, 1024 bits, 2048 bits, 4096 bits), ECDSA (P256, P384, P521)
*2
SHA1-RSA
, SHA256-RSA, SHA384-RSA
*2
ECDSA
, SHA256-ECDSA, SHA384-ECDSA, SHA512-ECDSA
322
*3
*3
*4
, SHA512-RSA
, MD5-RSA
23FJ-05K
*4
, MD2-RSA
, SHA1-