Chapter 14 Certificates 291Nortel Business Secure Router 222 Configuration — BasicsTable 75 describes the labels in Figure 95.Table 75 Trusted remote host detailsLabel DescriptionName This field displays the identifying name of this certificate. If you wantto change the name, type up to 31 characters to identify this keycertificate. You can use any character (not including spaces).Certification Path Click the Refresh button to have this read-only text box display theend entity’s own certificate and a list of certification authoritycertificates in the hierarchy of certification authorities that validate acertificate’s issuing certification authority. For a trusted host, the listconsists of the end entity’s own certificate and the default self-signedcertificate that the Business Secure Router uses to sign remote hostcertificates. Since the Business Secure Router considers its ownself-signed certificate to be a certification authority, the chain ofcertificates is complete and the Business Secure Router trusts thecertificate.Refresh Click Refresh to display the certification path.CertificateInformationThese read-only fields display detailed information about thecertificate.Type This field displays general information about the certificate. Withtrusted remote host certificates, this field always displays CA-signed.The Business Secure Router is the Certification Authority that signedthe certificate. X.509 means that this certificate was created andsigned according to the ITU-T X.509 recommendation that definesthe formats for public-key certificates.Version This field displays the X.509 version number.Serial Number This field displays the certificate’s identification number given by thedevice that created the certificate.Subject This field displays information that identifies the owner of thecertificate, such as Common Name (CN), Organizational Unit (OU),Organization (O), or Country (C).Issuer This field displays identifying information about the defaultself-signed certificate on the Business Secure Router that theBusiness Secure Router uses to sign the trusted remote hostcertificates.SignatureAlgorithmThis field displays the type of algorithm that the Business SecureRouter used to sign the certificate, which is rsa-pkcs1-sha1 (RSApublic-private key encryption algorithm and the SHA1 hashalgorithm).Valid From This field displays the date that the certificate becomes applicable.The text displays in red and includes a Not Yet Valid! message if thecertificate has not yet become applicable.