Cisco Systems VPN 3000 Switch User Manual


 
14 Administration
14-46
VPN 3000 Concentrator Series User Guide
MD5 Thumbprint
A 128-bit MD5 hash of the complete certificate contents, shown as a 16-byte string. This value is unique
for every certificate, and it positively identifies the certificate. If you question a certificates authenticity,
you can check this value with the issuer.
SHA1 Thumbprint
A 160-bit SHA-1 hash of the complete certificate contents, shown as a 20-byte string. This value is
unique for every certificate, and it positively identifies the certificate. If you question a certificates
authenticity, you can check this value with the issuer.
Validity
The time period during which this certificate is valid.
Format is MM/DD/YYYY at HH:MM:SS AM/PM to MM/DD/YYYY at HH:MM:SS AM/PM. Time
uses 12-hour AM/PM notation, and is local system time.
The Manager checks the validity against the VPN Concentrator system clock, and it flags expired
certificates.
Subject Alternative Name (Fully Qualified Domain Name)
The fully qualified domain name for this VPN Concentrator that identifies it in this PKI. The alternative
name is an optional additional data field in the certificate, and it provides interoperability with many
Cisco IOS and PIX systems in LAN-to-LAN connections.
CRL Distribution Point
The distribution point for CRLs (Certificate Revocation Lists) from this CA. If this information is
included in the certificate in the proper format, and you enable CRL checking, you do not have to provide
it on the
Administration | Certificate Management | Certificates | CRL screen.
Back
To return to the Administration | Certificate Management | Certificates screen, click Back.
Administration | Certificate Management | Certificates | CRL
This screen lets you enable Certificate Revocation List (CRL) checking for CA certificates installed in
the VPN Concentrator.
A certificate is normally expected to be valid for its entire validity period. However, if a certificate
becomes invalid due to a name change, change of association between the subject and the CA, security
compromise, etc., the CA revokes the certificate. Under X.509, CAs revoke certificates by periodically
issuing a signed Certificate Revocation List (CRL), where each revoked certificate is identified by its