background image

 

Version 2.0 

Creating your own Certificate Authority with OpenSSL 
 

 
 

1-  In first step you need to create your own CA. To do that, follow the instructions 

documented in here: 

http://sandbox.rulemaker.net/ngps/m2/howto.ca.html

 

 

2-  Netgear doesn’t support ST relative distinguish name so please edit the openssl.cfg (in 

the original location and in your new CA folder) to avoid using this parameter. 

 
3- 

From the guide linked above, you need only to execute all the commands up to step 4. 
The certificate request step and beyond will be handled by the router. 

 

4- 

Next – please generate Self Certificate Request specifying the following parameters: 

 

 

 
1-  Name: first 
2-  Subject: CN=router1 
3-  Hash Algorithm: MD5 
4-  Signature Algorithm: RSA 
5-  Signature Key Length: 1024 
6-  Click on Generate 

 

 
 

5-  Click on: “

View

” for generated certificate request to check its values: 

 

 

 
 

 

 

Copy all the information from 
the 

Data to supply to CA

 field 

to the text file 

router1.csr

 

 

 

 

 

Summary of Contents for FVG318v2 - ProSafe 802.11g Wireless VPN Firewall Switch

Page 1: ...as authentication method for VPN connections between Netgear ProSafe Routers and the ProSafe VPN Client This document describes how to use certificates as an authentication method when establishing a...

Page 2: ...exclusive to other methods 1 OpenSSL http www openssl org 2 SimpleCA http www vpnc org SimpleCA 3 Microsoft s IIS For purpose of this document we used 1 OpenSSL which could be downloaded from the fol...

Page 3: ...avoid using this parameter 3 From the guide linked above you need only to execute all the commands up to step 4 The certificate request step and beyond will be handled by the router 4 Next please gene...

Page 4: ...CAkey cakey pem CAcreateserial out router1 crt router1 csr generated self certificate request router cacert crt CA certification cakey pem CA keys router1 crt signed certificate router 7 Load CA certi...

Page 5: ...oSafe VPN Client following these steps First click on Request Certificate Then click on Yes when you get the file based request prompt For last input the settings like instructed in the screenshot Not...

Page 6: ...A cacert crt CAkey cakey pem CAcreateserial out client1 crt client1 csr generated self certificate request client cacert crt CA certification cakey pem CA keys client1 crt signed certificate client 12...

Page 7: ...same way that is instructed here and click on Edit Name Verify your settings are input correctly in this screen and click on OK Select the correct certificate leave the ID Type as Distinguished Name V...

Page 8: ...h those in this screenshot For the Proposal 1 of the Authentication phase Phase 1 the Authentication Method should be RSA Signatures The Key Exchange Proposal should be correct by default but check it...

Page 9: ...te the VPN Policy leaving the IKE policy 3 Create new record for Mode Config in the following way Note IP address ranges defined in First Second and Third Pool should be different then router s own LA...

Reviews: