ZyXEL Communications NWA5301-NJ User Manual page 111

802.11 b/g/n in-wall managed access point
Hide thumbs Also See for NWA5301-NJ:
Table of Contents

Advertisement

The following table describes the labels in this screen.
Table 53 Configuration > Object > Certificate > Trusted Certificates > Edit
LABEL
Name
Certification Path
Refresh
Enable X.509v3 CRL
Distribution Points
and OCSP checking
OCSP Server
URL
ID
Password
LDAP Server
Address
Port
ID
Password
Certificate
Information
Type
Version
Serial Number
Subject
Issuer
NWA5301-NJ User's Guide
DESCRIPTION
This field displays the identifying name of this certificate. You can change the name. You
can use up to 31 alphanumeric and ;'~!@#$%^&()_+[]{}',.=- characters.
Click the Refresh button to have this read-only text box display the end entity's
certificate and a list of certification authority certificates that shows the hierarchy of
certification authorities that validate the end entity's certificate. If the issuing
certification authority is one that you have imported as a trusted certificate, it may be
the only certification authority in the list (along with the end entity's own certificate).
The NWA does not trust the end entity's certificate and displays "Not trusted" in this
field if any certificate on the path has expired or been revoked.
Click Refresh to display the certification path.
Select this check box to have the NWA check incoming certificates that are signed by
this certificate against a Certificate Revocation List (CRL) or an OCSP server. You also
need to configure the OSCP or LDAP server details.
Select this check box if the directory server uses OCSP (Online Certificate Status
Protocol).
Type the protocol, IP address and pathname of the OCSP server.
The NWA may need to authenticate itself in order to assess the OCSP server. Type the
login name (up to 31 ASCII characters) from the entity maintaining the server (usually
a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the OCSP
server (usually a certification authority).
Select this check box if the directory server uses LDAP (Lightweight Directory Access
Protocol). LDAP is a protocol over TCP that specifies how clients access directories of
certificates and lists of revoked certificates.
Type the IP address (in dotted decimal notation) of the directory server.
Use this field to specify the LDAP server port number. You must use the same server
port number that the directory server uses. 389 is the default server port number for
LDAP.
The NWA may need to authenticate itself in order to assess the CRL directory server.
Type the login name (up to 31 ASCII characters) from the entity maintaining the server
(usually a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the CRL
directory server (usually a certification authority).
These read-only fields display detailed information about the certificate.
This field displays general information about the certificate. CA-signed means that a
Certification Authority signed the certificate. Self-signed means that the certificate's
owner signed the certificate (not a certification authority). X.509 means that this
certificate was created and signed according to the ITU-T X.509 recommendation that
defines the formats for public-key certificates.
This field displays the X.509 version number.
This field displays the certificate's identification number given by the certification
authority.
This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O) and Country (C).
This field displays identifying information about the certificate's issuing certification
authority, such as Common Name, Organizational Unit, Organization and Country.
With self-signed certificates, this is the same information as in the Subject Name field.
Chapter 11 Certificates
111

Advertisement

Table of Contents
loading

Table of Contents