Nokia Network Voyager for IPSO 4.0 Reference Guide 337
3. Click on the new link with the same name that you entered in Step 1. This action takes you
to the IPSec Certificate Addition page for that specific certificate.
4. On the Certificate Addition page, you have two choices:
If you have the PEM (base64) encoded certificate, select the Paste the PEM Certificate
option.
If you know the URL to the certificate (including the local file), select the Enter URL to
the Certificate option.
5. Click Apply.
Note
This action takes you to the next page that asks for the PEM encoded certificate or the
URL information of the certificate. If you have the PEM encoded certificate, proceed to
step 5; if you reach the URL to the certificate, skip to step 6.
6. If you are asked to enter the PEM coded certificate, use the copy and paste function of your
browser to copy the PEM text of the certificate into the text box titled Paste the PEM
Encoded Certificate; click Apply. This action should print a Success message. Click on the
link titled IPSec General Configuration page to return to the main IPSec configuration page.
7. If you are asked to enter URL information of the certificate, enter the URL to the certificate.
Examples are:
http://test.acme.com/dev1.cert
ftp://test.acme.com/dev1.cert
file://tmp/dev1.cert
1dap://test.acme.com/cn=dev1.acme.com?pem_x509?sub
Enter the HTTP realm information (only for the HTTP protocol); enter the user name and
password if needed to connect to the FTP/HTTP server.
8. Click Apply. This action should print a Success message. Click on the link titled IPSec
General Configuration page to return to the main IPSec Configuration page.
Repeat the steps in this procedure for every trusted CA certificate that needs to be installed.
Note
On successful completion, a green button appears under the Certificate File column. The
green button indicates that the certificate file is present on the machine and it is also a link to
view the installed certificate.
Device Certificates
A device certificate is used to identify a particular IPSec system. Follow the steps below.