Chapter 43 Certificates
ZyWALL USG 2000 User’s Guide
683
Type
This field displays general information about the certificate. CA-signed
means that a Certification Authority signed the certificate. Self-signed
means that the certificate’s owner signed the certificate (not a
certification authority). X.509 means that this certificate was created
and signed according to the ITU-T X.509 recommendation that
defines the formats for public-key certificates.
Version
This field displays the X.509 version number.
Serial Number
This field displays the certificate’s identification number given by the
certification authority.
Subject
This field displays information that identifies the owner of the
certificate, such as Common Name (CN), Organizational Unit (OU),
Organization (O) and Country (C).
Issuer
This field displays identifying information about the certificate’s
issuing certification authority, such as Common Name, Organizational
Unit, Organization and Country.
With self-signed certificates, this is the same information as in the
Subject Name field.
Signature
Algorithm
This field displays the type of algorithm that was used to sign the
certificate. Some certification authorities use rsa-pkcs1-sha1 (RSA
public-private key encryption algorithm and the SHA1 hash
algorithm). Other certification authorities may use rsa-pkcs1-md5
(RSA public-private key encryption algorithm and the MD5 hash
algorithm).
Valid From
This field displays the date that the certificate becomes applicable.
The text displays in red and includes a Not Yet Valid! message if the
certificate has not yet become applicable.
Valid To
This field displays the date that the certificate expires. The text
displays in red and includes an Expiring! or Expired! message if the
certificate is about to expire or has already expired.
Key Algorithm
This field displays the type of algorithm that was used to generate the
certificate’s key pair (the ZyWALL uses RSA encryption) and the
length of the key set in bits (1024 bits for example).
Subject
Alternative Name
This field displays the certificate’s owner‘s IP address (IP), domain
name (DNS) or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used.
For example, “DigitalSignature” means that the key can be used to
sign certificates and “KeyEncipherment” means that the key can be
used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For
example, Subject Type=CA means that this is a certification
authority’s certificate and “Path Length Constraint=1” means that
there can only be one certification authority in the certificate’s path.
MD5 Fingerprint
This is the certificate’s message digest that the ZyWALL calculated
using the MD5 algorithm. You can use this value to verify with the
certification authority (over the phone for example) that this is
actually their certificate.
Table 215
Object > Certificate > Trusted Certificates > Edit (continued)
LABEL
DESCRIPTION
Summary of Contents for ZyXEL ZyWALL USG-1000
Page 2: ......
Page 30: ...30 ...
Page 58: ...Chapter 3 Web Configurator ZyWALL USG 2000 User s Guide 58 ...
Page 84: ...Chapter 4 Wizard Setup ZyWALL USG 2000 User s Guide 84 ...
Page 136: ...Chapter 6 Tutorials ZyWALL USG 2000 User s Guide 136 ...
Page 166: ...Chapter 9 Signature Update ZyWALL USG 2000 User s Guide 166 ...
Page 168: ...168 ...
Page 234: ...Chapter 11 Trunks ZyWALL USG 2000 User s Guide 234 ...
Page 248: ...Chapter 12 Policy and Static Routes ZyWALL USG 2000 User s Guide 248 ...
Page 272: ...Chapter 15 DDNS ZyWALL USG 2000 User s Guide 272 ...
Page 287: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 287 ...
Page 288: ...Chapter 16 Virtual Servers ZyWALL USG 2000 User s Guide 288 ...
Page 307: ...307 PART III Firewall Firewall 309 ...
Page 308: ...308 ...
Page 326: ...Chapter 20 Firewall ZyWALL USG 2000 User s Guide 326 ...
Page 328: ...328 ...
Page 370: ...Chapter 21 IPSec VPN ZyWALL USG 2000 User s Guide 370 ...
Page 392: ...Chapter 23 SSL User Screens ZyWALL USG 2000 User s Guide 392 ...
Page 394: ...Chapter 24 SSL User Application Screens ZyWALL USG 2000 User s Guide 394 ...
Page 402: ...Chapter 25 SSL User File Sharing ZyWALL USG 2000 User s Guide 402 ...
Page 412: ...Chapter 27 L2TP VPN ZyWALL USG 2000 User s Guide 412 ...
Page 440: ...Chapter 28 L2TP VPN Example ZyWALL USG 2000 User s Guide 440 ...
Page 441: ...441 PART V Application Patrol Application Patrol 443 ...
Page 442: ...442 ...
Page 470: ...470 ...
Page 531: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 531 Figure 371 Profiles Protocol Anomaly ...
Page 540: ...Chapter 32 ADP ZyWALL USG 2000 User s Guide 540 ...
Page 566: ...Chapter 33 Content Filtering ZyWALL USG 2000 User s Guide 566 ...
Page 574: ...Chapter 34 Content Filter Reports ZyWALL USG 2000 User s Guide 574 ...
Page 593: ...593 PART VII Device HA Device HA 595 ...
Page 594: ...594 ...
Page 614: ...614 ...
Page 636: ...Chapter 38 Addresses ZyWALL USG 2000 User s Guide 636 ...
Page 660: ...Chapter 41 AAA Server ZyWALL USG 2000 User s Guide 660 ...
Page 686: ...Chapter 43 Certificates ZyWALL USG 2000 User s Guide 686 ...
Page 698: ...Chapter 45 SSL Application ZyWALL USG 2000 User s Guide 698 ...
Page 699: ...699 PART IX System System 701 ...
Page 700: ...700 ...
Page 750: ...750 ...
Page 776: ...Chapter 48 Logs ZyWALL USG 2000 User s Guide 776 ...
Page 794: ...Chapter 49 Reports ZyWALL USG 2000 User s Guide 794 ...
Page 796: ...Chapter 50 Diagnostics ZyWALL USG 2000 User s Guide 796 ...
Page 798: ...Chapter 51 Reboot ZyWALL USG 2000 User s Guide 798 ...
Page 812: ...Chapter 53 Product Specifications ZyWALL USG 2000 User s Guide 812 ...
Page 814: ...814 ...
Page 874: ...Appendix A Log Descriptions ZyWALL USG 2000 User s Guide 874 ...
Page 956: ...Appendix E Open Software Announcements ZyWALL USG 2000 User s Guide 956 ...
Page 960: ...Appendix F Legal Information ZyWALL USG 2000 User s Guide 960 ...