![ZyXEL Communications P-660HN-F1A User Manual Download Page 234](http://html1.mh-extra.com/html/zyxel-communications/p-660hn-f1a/p-660hn-f1a_user-manual_944065234.webp)
Chapter 13 Certificates
P-660HN-F1A User’s Guide
234
13.3 Certificates Technical Reference
This section provides technical background information about the topics covered in
this chapter.
13.3.1 Certificates Overview
The P-660HN-F1A can use certificates (also called digital IDs) to authenticate
users. Certificates are based on public-private key pairs. A certificate contains the
certificate owner’s identity and public key. Certificates provide a way to exchange
public keys for use in authentication.
The P-660HN-F1A uses certificates based on public-key cryptology to authenticate
users attempting to establish a connection, not to encrypt the data that you send
after establishing a connection. The method used to secure the data that you send
through an established connection depends on the type of connection. For
example, a VPN tunnel might use the triple DES encryption algorithm.
The certification authority uses its private key to sign certificates. Anyone can then
use the certification authority’s public key to verify the certificates.
Advantages of Certificates
Certificates offer the following benefits.
• The P-660HN-F1A only has to store the certificates of the certification
authorities that you decide to trust, no matter how many devices you need to
authenticate.
• Key distribution is simple and very secure since you can freely distribute public
keys and you never need to transmit private keys.
13.3.2 Private-Public Certificates
When using public-key cryptology for authentication, each host has two keys. One
key is public and can be made openly available. The other key is private and must
be kept secure.
These keys work like a handwritten signature (in fact, certificates are often
referred to as “digital signatures”). Only you can write your signature exactly as it
should look. When people know what your signature looks like, they can verify
whether something was signed by you, or by someone else. In the same way, your
private key “writes” your digital signature and your public key allows people to
verify whether data was signed by you, or by someone else. This process works as
follows.
Summary of Contents for P-660HN-F1A
Page 2: ......
Page 10: ...Contents Overview P 660HN F1A User s Guide 10...
Page 20: ...Table of Contents P 660HN F1A User s Guide 20...
Page 21: ...21 PART I User s Guide...
Page 22: ...22...
Page 36: ...Chapter 2 Introducing the Web Configurator P 660HN F1A User s Guide 36...
Page 44: ...Chapter 3 Status Screens P 660HN F1A User s Guide 44...
Page 84: ...Chapter 4 Tutorials P 660HN F1A User s Guide 84 Physical Port 1 3 exclude port 4 3 Click Apply...
Page 88: ...Chapter 4 Tutorials P 660HN F1A User s Guide 88...
Page 103: ...103 PART II Technical Reference...
Page 104: ...104...
Page 142: ...Chapter 7 LAN Setup P 660HN F1A User s Guide 142...
Page 188: ...Chapter 9 Network Address Translation NAT P 660HN F1A User s Guide 188...
Page 210: ...Chapter 10 Firewalls P 660HN F1A User s Guide 210...
Page 236: ...Chapter 13 Certificates P 660HN F1A User s Guide 236...
Page 240: ...Chapter 14 Static Route P 660HN F1A User s Guide 240...
Page 276: ...Chapter 17 Dynamic DNS Setup P 660HN F1A User s Guide 276...
Page 288: ...Chapter 18 Remote Management P 660HN F1A User s Guide 288...
Page 344: ...Chapter 24 Troubleshooting P 660HN F1A User s Guide 344...
Page 376: ...Appendix A Setting up Your Computer s IP Address P 660HN F1A User s Guide 376...
Page 386: ...Appendix B Pop up Windows JavaScripts and Java Permissions P 660HN F1A User s Guide 386...
Page 396: ...Appendix C IP Addresses and Subnetting P 660HN F1A User s Guide 396...
Page 420: ...Appendix F Legal Information P 660HN F1A User s Guide 420...
Page 430: ...Index P 660HN F1A User s Guide 430...