Configuring Security Features221Managing the Trusted Certificates ListWhen the system serves as a TLS client and requests a TLS connection with a server, the systemshould verify the server certificate sent by the server to decide whether it is trusted based on thetrusted certificates list.The trusted certificates list contains the default and custom certificates. Default Certificates: The system has 36 built-in trusted certificates. For more informationrefer to Appendix B: Trusted Certificates on page 264. Custom Certificates: You can upload up to 10 trusted certificates to the system. Theformat of the certificates must be *.pem, *.cer, *.crt and *.der.Trusted certificates parameters on the system are described below:Parameter Description Configuration MethodOnly AcceptTrustedCertificatesEnables or disables the system to only trustthe server certificates in the trustedcertificates list.Default: EnabledNote: If it is enabled, the system willauthenticate the server certificate based onthe trusted certificates list. Only when theauthentication succeeds, will the system trustthe server.If you change this parameter, the system willreboot to make the change take effect.Web User InterfaceCommonNameValidationEnables or disables the system to mandatorilyvalidate the CommonName orSubjectAltName of the server certificate sentby the server. This security verification rulesare compliant with RFC 2818.Default: DisabledNote: If you change this parameter, thesystem will reboot to make the change takeeffect.Web User InterfaceCACertificatesConfigures the type of certificates in theTrusted Certificates list for the system toauthenticate for the TLS connection. Default Certificates Custom Certificates All CertificatesWeb User Interface