
P-2602HWLNI User’s Guide
301
C
H A P T E R
19
Certificates
This chapter gives background information about public-key certificates and explains how to
use them.
19.1 Certificates Overview
The ZyXEL Device can use certificates (also called digital IDs) to authenticate users.
Certificates are based on public-private key pairs. A certificate contains the certificate owner’s
identity and public key. Certificates provide a way to exchange public keys for use in
authentication.
A Certification Authority (CA) issues certificates and guarantees the identity of each
certificate owner. There are commercial certification authorities like CyberTrust or VeriSign
and government certification authorities. You can use the ZyXEL Device to generate
certification requests that contain identifying information and public keys and then send the
certification requests to a certification authority.
When using public-key cryptology for authentication, each host has two keys. One key is
public and can be made openly available; the other key is private and must be kept secure.
Public-key encryption in general works as follows.
1
Tim wants to send a private message to Jenny. Tim generates a public key pair. What is
encrypted with one key can only be decrypted using the other.
2
Tim keeps the private key and makes the public key openly available.
3
Tim uses his private key to encrypt the message and sends it to Jenny.
4
Jenny receives the message and uses Tim’s public key to decrypt it.
5
Additionally, Jenny uses her own private key to encrypt a message and Tim uses Jenny’s
public key to decrypt the message.
The ZyXEL Device uses certificates based on public-key cryptology to authenticate users
attempting to establish a connection. The method used to secure the data that you send through
an established connection depends on the type of connection. For example, a VPN tunnel
might use the triple DES encryption algorithm.
The certification authority uses its private key to sign certificates. Anyone can then use the
certification authority’s public key to verify the certificates.
A certification path is the hierarchy of certification authority certificates that validate a
certificate. The ZyXEL Device does not trust a certificate if any certificate on its path has
expired or been revoked.
Содержание P-2602HWLNI
Страница 2: ......
Страница 7: ...Safety Warnings P 2602HWLNI User s Guide 7...
Страница 8: ...Safety Warnings P 2602HWLNI User s Guide 8...
Страница 24: ...Table of Contents P 2602HWLNI User s Guide 24...
Страница 32: ...List of Figures P 2602HWLNI User s Guide 32...
Страница 38: ...List of Tables P 2602HWLNI User s Guide 38...
Страница 39: ...39 PART I Introduction Introducing the ZyXEL Device 41 Introducing the Web Configurator 49...
Страница 40: ...40...
Страница 60: ...Chapter 2 Introducing the Web Configurator P 2602HWLNI User s Guide 60...
Страница 62: ...62...
Страница 86: ...Chapter 5 Bandwidth Management Wizard P 2602HWLNI User s Guide 86...
Страница 98: ...Chapter 6 Status Screens P 2602HWLNI User s Guide 98...
Страница 99: ...99 PART III Network WAN Setup 101 LAN Setup 117 Wireless LAN 129 Network Address Translation NAT Screens 155...
Страница 100: ...100...
Страница 154: ...Chapter 9 Wireless LAN P 2602HWLNI User s Guide 154...
Страница 166: ...Chapter 10 Network Address Translation NAT Screens P 2602HWLNI User s Guide 166...
Страница 167: ...167 PART IV VoIP Voice 169 VoIP Trunking 211 Phone Usage 227...
Страница 168: ...168...
Страница 226: ...Chapter 12 VoIP Trunking P 2602HWLNI User s Guide 226...
Страница 230: ...Chapter 13 Phone Usage P 2602HWLNI User s Guide 230...
Страница 232: ...232...
Страница 264: ...Chapter 15 Firewall Configuration P 2602HWLNI User s Guide 264...
Страница 268: ...Chapter 16 Content Filtering P 2602HWLNI User s Guide 268...
Страница 274: ...Chapter 17 Introduction to IPSec P 2602HWLNI User s Guide 274...
Страница 309: ...Chapter 19 Certificates P 2602HWLNI User s Guide 309 Figure 173 My Certificate Details...
Страница 320: ...Chapter 19 Certificates P 2602HWLNI User s Guide 320 Figure 181 Trusted Remote Host Details...
Страница 326: ...326...
Страница 330: ...Chapter 20 Static Route P 2602HWLNI User s Guide 330...
Страница 338: ...Chapter 21 Bandwidth Management P 2602HWLNI User s Guide 338...
Страница 342: ...Chapter 22 Dynamic DNS Setup P 2602HWLNI User s Guide 342...
Страница 360: ...Chapter 23 Remote Management Configuration P 2602HWLNI User s Guide 360...
Страница 372: ...Chapter 24 Universal Plug and Play UPnP P 2602HWLNI User s Guide 372...
Страница 374: ...374...
Страница 380: ...Chapter 25 System P 2602HWLNI User s Guide 380...
Страница 406: ...Chapter 28 Troubleshooting P 2602HWLNI User s Guide 406...
Страница 422: ...Chapter 30 Diagnostic P 2602HWLNI User s Guide 422...
Страница 432: ...Chapter 31 Product Specifications P 2602HWLNI User s Guide 432...
Страница 434: ...434...
Страница 446: ...Appendix A Setting up Your Computer s IP Address P 2602HWLNI User s Guide 446...
Страница 482: ...Appendix F Legal Information P 2602HWLNI User s Guide 482...
Страница 488: ...Appendix G Customer Support P 2602HWLNI User s Guide 488...