P-2608HWL-Dx Series User’s Guide
264
Chapter 19 Certificates
19.11 Trusted Remote Hosts
Click
Security > Certificates > Trusted Remote Hosts
to open the
Trusted Remote Hosts
screen. This screen displays a list of the certificates of peers that you trust but which are not
signed by one of the certification authorities on the
Trusted CAs
screen.
You do not need to add any certificate that is signed by one of the certification authorities on
the
Trusted CAs
screen since the ZyXEL Device automatically accepts any valid certificate
signed by a trusted certification authority as being trustworthy.
Key Algorithm
This field displays the type of algorithm that was used to generate the
certificate’s key pair (the ZyXEL Device uses RSA encryption) and the length of
the key set in bits (1024 bits for example).
Subject Alternative
Name
This field displays the certificate’s owner‘s IP address (IP), domain name (DNS)
or e-mail address (EMAIL).
Key Usage
This field displays for what functions the certificate’s key can be used. For
example, “DigitalSignature” means that the key can be used to sign certificates
and “KeyEncipherment” means that the key can be used to encrypt text.
Basic Constraint
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority’s certificate and
“Path Length Constraint=1” means that there can only be one certification
authority in the certificate’s path.
CRL Distribution
Points
This field displays how many directory servers with Lists of revoked certificates
the issuing certification authority of this certificate makes available. This field
also displays the domain names or IP addresses of the servers.
MD5 Fingerprint
This is the certificate’s message digest that the ZyXEL Device calculated using
the MD5 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
SHA1 Fingerprint
This is the certificate’s message digest that the ZyXEL Device calculated using
the SHA1 algorithm. You can use this value to verify with the certification
authority (over the phone for example) that this is actually their certificate.
Certificate in PEM
(Base-64) Encoded
Format
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Export
Click this button and then
Save
in the
File Download
screen. The
Save As
screen opens, browse to the location that you want to use and click
Save
.
Apply
Click
Apply
to save your changes back to the ZyXEL Device. You can only
change the name and/or set whether or not you want the ZyXEL Device to check
the CRL that the certification authority issues before trusting a certificate issued
by the certification authority.
Cancel
Click
Cancel
to quit and return to the
Trusted CAs
screen.
Table 97
Trusted CA Details (continued)
LABEL
DESCRIPTION
Содержание P-2608HWL-D1
Страница 1: ...P 2608HWL Dx Series 802 11g Wireless ADSL2 VoIP IAD User s Guide Version 3 40 10 2006 Edition 1 ...
Страница 2: ......
Страница 7: ...P 2608HWL Dx Series User s Guide Safety Warnings 7 This product is recyclable Dispose of it properly ...
Страница 24: ...P 2608HWL Dx Series User s Guide 24 Table of Contents ...
Страница 32: ...P 2608HWL Dx Series User s Guide 32 List of Figures ...
Страница 38: ...P 2608HWL Dx Series User s Guide 38 List of Tables ...
Страница 44: ...P 2608HWL Dx Series User s Guide 44 Chapter 1 Getting To Know the ZyXEL Device ...
Страница 66: ...P 2608HWL Dx Series User s Guide 66 Chapter 3 Internet and Wireless Setup Wizard ...
Страница 72: ...P 2608HWL Dx Series User s Guide 72 Chapter 4 VoIP Wizard And Example ...
Страница 78: ...P 2608HWL Dx Series User s Guide 78 Chapter 5 Bandwidth Management Wizard ...
Страница 88: ...P 2608HWL Dx Series User s Guide 88 Chapter 6 Status Screens ...
Страница 118: ...P 2608HWL Dx Series User s Guide 118 Chapter 8 LAN Setup ...
Страница 138: ...P 2608HWL Dx Series User s Guide 138 Chapter 9 Wireless LAN ...
Страница 166: ...P 2608HWL Dx Series User s Guide 166 Chapter 11 SIP ...
Страница 176: ...P 2608HWL Dx Series User s Guide 176 Chapter 12 Phone ...
Страница 184: ...P 2608HWL Dx Series User s Guide 184 Chapter 13 Phone Book ...
Страница 206: ...P 2608HWL Dx Series User s Guide 206 Chapter 16 Firewall Configuration Figure 107 Firewall Edit Rule ...
Страница 220: ...P 2608HWL Dx Series User s Guide 220 Chapter 17 Content Filtering ...
Страница 257: ...P 2608HWL Dx Series User s Guide Chapter 19 Certificates 257 Figure 138 My Certificate Details ...
Страница 268: ...P 2608HWL Dx Series User s Guide 268 Chapter 19 Certificates Figure 146 Trusted Remote Host Details ...
Страница 276: ...P 2608HWL Dx Series User s Guide 276 Chapter 20 Static Route ...
Страница 288: ...P 2608HWL Dx Series User s Guide 288 Chapter 21 Bandwidth Management ...
Страница 292: ...P 2608HWL Dx Series User s Guide 292 Chapter 22 Dynamic DNS Setup ...
Страница 306: ...P 2608HWL Dx Series User s Guide 306 Chapter 23 Remote Management Configuration ...
Страница 318: ...P 2608HWL Dx Series User s Guide 318 Chapter 24 Universal Plug and Play UPnP ...
Страница 324: ...P 2608HWL Dx Series User s Guide 324 Chapter 25 System ...
Страница 344: ...P 2608HWL Dx Series User s Guide 344 Chapter 27 Tools ...
Страница 348: ...P 2608HWL Dx Series User s Guide 348 Chapter 28 Diagnostic ...
Страница 360: ...P 2608HWL Dx Series User s Guide 360 Chapter 29 Troubleshooting ...
Страница 378: ...P 2608HWL Dx Series User s Guide 378 Appendix B Setting up Your Computer s IP Address ...
Страница 402: ...P 2608HWL Dx Series User s Guide 402 Appendix F Triangle Route ...
Страница 440: ...P 2608HWL Dx Series User s Guide 440 Appendix H Internal SPTGEN ...