User guide
Using Certificates
Chapter 19: Working With VPNs 659
Safe@Office VPN Server for the first time, the entity should check that the VPN peer's
fingerprint displayed in the SecuRemote/SecureClient VPN Client is identical to the
fingerprint received.
The Safe@Office appliance supports certificates encoded in the PKCS#12 (Personal
Information Exchange Syntax Standard) format.
Installing a Certificate
The Safe@Office appliance enables you to install PKCS#12 certificates in the following
ways:
• By generating a self-signed certificate.
See Generating a Self-Signed Certificate on page 660.
• By importing a certificate.
The PKCS#12 file you import must have a ".p12" file extension. If you do not have
such a PKCS#12 file, obtain one from your network security administrator.
See Importing a Certificate on page 664.
Note: To use certificates authentication, each Safe@Office appliance should have a
unique certificate. Do not use the same certificate for more than one gateway.
Note: If your Safe@Office appliance is centrally managed, a certificate is
automatically generated and downloaded to your appliance. In this case, there is no
need to generate a self-signed certificate.