C
H A P T E R
17.1 Overview
This chapter describes how your ZyXEL Device can use certificates as a means of
authenticating wireless clients. It gives background information about public-key
certificates and explains how to use them.
A certificate contains the certificate owner's identity and public key. Certificates
provide a way to exchange public keys for use in authentication.
Figure 64 Certificates Example
In the figure above, the ZyXEL Device (Z) checks the identity of the notebook (A)
using a certificate before granting it access to the network.
17.1.1 What You Can Do in the Certificates Screens
• Use the Trusted CAs screens
certificates to the ZyXEL Device.
17.1.2 What You Need to Know About Certificates
Certification Authority
A Certification Authority (CA) issues certificates and guarantees the identity of
each certificate owner. There are commercial certification authorities like
CyberTrust or VeriSign and government certification authorities. You can use the
ZyXEL Device to generate certification requests that contain identifying
information and public keys and then send the certification requests to a
certification authority.
P-663HN-51 User's Guide
Certificates
(Section 17.2 on page
134) to save CA
17
133