Chapter 18 Certificates
NWA-3500/NWA-3550 User’s Guide
226
4 Use a secure method to verify that the certificate owner has the same information
in the Thumbprint Algorithm and Thumbprint fields. The secure method may
vary according to your situation. Possible examples would be over the telephone
or through an HTTPS connection.