
Chapter 19 Certificates
P-2602HWLNI User’s Guide
321
The following table describes the labels in this screen.
Table 125
Trusted Remote Host Details
LABEL
DESCRIPTION
Name
This field displays the identifying name of this certificate. If you want to change
the name, type up to 31 characters to identify this key certificate. You may use
any character (not including spaces).
Certification Path
Click the
Refresh
button to have this read-only text box display the end entity’s
own certificate and a list of certification authority certificates in the hierarchy of
certification authorities that validate a certificate’s issuing certification authority.
For a trusted host, the list consists of the end entity’s own certificate and the
default self-signed certificate that the ZyXEL Device uses to sign remote host
certificates.
Refresh
Click
Refresh
to display the certification path.
Certificate
Information
These read-only fields display detailed information about the certificate.
Type
This field displays general information about the certificate. With trusted
remote host certificates, this field always displays CA-signed. The ZyXEL
Device is the Certification Authority that signed the certificate. X.509 means
that this certificate was created and signed according to the ITU-T X.509
recommendation that defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the device
that created the certificate.
Subject
This field displays information that identifies the owner of the certificate, such
as Common Name (CN), Organizational Unit (OU), Organization (O) and
Country (C).
Issuer
This field displays identifying information about the default self-signed
certificate on the ZyXEL Device that the ZyXEL Device uses to sign the trusted
remote host certificates.
Signature Algorithm
This field displays the type of algorithm that the ZyXEL Device used to sign the
certificate, which is rsa-pkcs1-sha1 (RSA public-private key encryption
algorithm and the SHA1 hash algorithm).
Valid From
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
Valid To
This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to
expire or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate the
certificate’s key pair (the ZyXEL Device uses RSA encryption) and the length
of the key set in bits (1024 bits for example).
Subject Alternative
Name
This field displays the certificate’s owner‘s IP address (IP), domain name
(DNS) or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
Summary of Contents for P-2602HWLNI
Page 2: ......
Page 7: ...Safety Warnings P 2602HWLNI User s Guide 7...
Page 8: ...Safety Warnings P 2602HWLNI User s Guide 8...
Page 24: ...Table of Contents P 2602HWLNI User s Guide 24...
Page 32: ...List of Figures P 2602HWLNI User s Guide 32...
Page 38: ...List of Tables P 2602HWLNI User s Guide 38...
Page 39: ...39 PART I Introduction Introducing the ZyXEL Device 41 Introducing the Web Configurator 49...
Page 40: ...40...
Page 60: ...Chapter 2 Introducing the Web Configurator P 2602HWLNI User s Guide 60...
Page 62: ...62...
Page 86: ...Chapter 5 Bandwidth Management Wizard P 2602HWLNI User s Guide 86...
Page 98: ...Chapter 6 Status Screens P 2602HWLNI User s Guide 98...
Page 100: ...100...
Page 154: ...Chapter 9 Wireless LAN P 2602HWLNI User s Guide 154...
Page 166: ...Chapter 10 Network Address Translation NAT Screens P 2602HWLNI User s Guide 166...
Page 167: ...167 PART IV VoIP Voice 169 VoIP Trunking 211 Phone Usage 227...
Page 168: ...168...
Page 226: ...Chapter 12 VoIP Trunking P 2602HWLNI User s Guide 226...
Page 230: ...Chapter 13 Phone Usage P 2602HWLNI User s Guide 230...
Page 232: ...232...
Page 264: ...Chapter 15 Firewall Configuration P 2602HWLNI User s Guide 264...
Page 268: ...Chapter 16 Content Filtering P 2602HWLNI User s Guide 268...
Page 274: ...Chapter 17 Introduction to IPSec P 2602HWLNI User s Guide 274...
Page 309: ...Chapter 19 Certificates P 2602HWLNI User s Guide 309 Figure 173 My Certificate Details...
Page 320: ...Chapter 19 Certificates P 2602HWLNI User s Guide 320 Figure 181 Trusted Remote Host Details...
Page 326: ...326...
Page 330: ...Chapter 20 Static Route P 2602HWLNI User s Guide 330...
Page 338: ...Chapter 21 Bandwidth Management P 2602HWLNI User s Guide 338...
Page 342: ...Chapter 22 Dynamic DNS Setup P 2602HWLNI User s Guide 342...
Page 360: ...Chapter 23 Remote Management Configuration P 2602HWLNI User s Guide 360...
Page 372: ...Chapter 24 Universal Plug and Play UPnP P 2602HWLNI User s Guide 372...
Page 374: ...374...
Page 380: ...Chapter 25 System P 2602HWLNI User s Guide 380...
Page 406: ...Chapter 28 Troubleshooting P 2602HWLNI User s Guide 406...
Page 422: ...Chapter 30 Diagnostic P 2602HWLNI User s Guide 422...
Page 432: ...Chapter 31 Product Specifications P 2602HWLNI User s Guide 432...
Page 434: ...434...
Page 446: ...Appendix A Setting up Your Computer s IP Address P 2602HWLNI User s Guide 446...
Page 482: ...Appendix F Legal Information P 2602HWLNI User s Guide 482...
Page 488: ...Appendix G Customer Support P 2602HWLNI User s Guide 488...