94
4.8 Web-Based Management - WBM
You can add, rename, define and remove key pairs or certificates by using the following buttons in the corre-
sponding table entry:
• : New element - adds a new key pair or certificate.
• : Delete element - Deletes by clicking on [Remove] the selected key pair respectively certificate
or, if selected, the Identity Store.
• : Details - Shows the detailed view of the corresponding element.
• : Download - You can download the public key content of a key pair as a PEM file.
– If a key certificate is available, you can download it as a CRT file.
– Save the file in a directory of your choice or open the file directly with a suitable tool.
• : Rename - depending on the position within a table, you can use this to rename the
corresponding element.
(2) Firewall
The CPU is delivered with a preset firewall. The Linux
®
firewall [nftables] is used here. As described below, you
can create rules from predefined basic rules or create your own new ones.
•
On delivery, the firewall is disabled!
•
Please note that you only have access to the firewall settings as an administrator!
1. Accessing the Firewall
1. Log in to the WBM as an administrator.
2. Navigate to [Security] - [Firewall].
The configuration page for the firewall is opened.