ZyWALL Series Internet Security Gateway
16.3
Configuration Summary........................................................................................................16-2
16.4
My Certificates .....................................................................................................................16-3
16.5
Certificate File Formats ........................................................................................................16-6
16.6
Importing a Certificate ..........................................................................................................16-7
16.7
Creating a Certificate ............................................................................................................16-8
16.8
My Certificate Details.........................................................................................................16-12
16.9
Trusted CAs ........................................................................................................................16-16
16.10
16.11
16.12
Trusted Remote Hosts.........................................................................................................16-23
16.13
16.14
16.15
16.16
Directory Servers ................................................................................................................16-32
16.17
17.1
17.2
Local User Database .............................................................................................................17-1
17.3
17.4
Configuring RADIUS ...........................................................................................................17-5
18.1
18.2
Introduction to HTTPS .........................................................................................................18-2
18.3
Configuring WWW...............................................................................................................18-4
18.4
HTTPS Login Example.........................................................................................................18-6
18.5
SSH Overview ....................................................................................................................18-14
18.6
How SSH works..................................................................................................................18-15
xiv
Table of Contents