ZyXEL Communications ZyWall USG 50-H Series User Manual page 503

Unified security gateway
Table of Contents

Advertisement

Table 189 Object > Certificate > Trusted Certificates > Edit (continued)
LABEL
Refresh
Enable X.509v3
CRL Distribution
Points and OCSP
checking
OCSP Server
URL
ID
Password
LDAP Server
Address
Port
ID
Password
Certificate
Information
Type
Version
Serial Number
Subject
Issuer
Signature Algorithm
ZyWALL USG 50-H User's Guide
DESCRIPTION
Click Refresh to display the certification path.
Select this check box to have the ZyWALL check incoming certificates that are
signed by this certificate against a Certificate Revocation List (CRL) or an OCSP
server. You also need to configure the OSCP or LDAP server details.
Select this check box if the directory server uses OCSP (Online Certificate
Status Protocol).
Type the protocol, IP address and pathname of the OCSP server.
The ZyWALL may need to authenticate itself in order to assess the OCSP
server. Type the login name (up to 31 ASCII characters) from the entity
maintaining the server (usually a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the
OCSP server (usually a certification authority).
Select this check box if the directory server uses LDAP (Lightweight Directory
Access Protocol). LDAP is a protocol over TCP that specifies how clients
access directories of certificates and lists of revoked certificates.
Type the IP address (in dotted decimal notation) of the directory server.
Use this field to specify the LDAP server port number.
You must use the same server port number that the directory server uses.
389 is the default server port number for LDAP.
The ZyWALL may need to authenticate itself in order to assess the CRL
directory server. Type the login name (up to 31 ASCII characters) from the entity
maintaining the server (usually a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the
CRL directory server (usually a certification authority).
These read-only fields display detailed information about the certificate.
This field displays general information about the certificate. CA-signed means
that a Certification Authority signed the certificate. Self-signed means that the
certificate's owner signed the certificate (not a certification authority). X.509
means that this certificate was created and signed according to the ITU-T X.509
recommendation that defines the formats for public-key certificates.
This field displays the X.509 version number.
This field displays the certificate's identification number given by the certification
authority.
This field displays information that identifies the owner of the certificate, such as
Common Name (CN), Organizational Unit (OU), Organization (O) and Country
(C).
This field displays identifying information about the certificate's issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same information as in the Subject
Name field.
This field displays the type of algorithm that was used to sign the certificate.
Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key
encryption algorithm and the SHA1 hash algorithm). Other certification
authorities may use rsa-pkcs1-md5 (RSA public-private key encryption
algorithm and the MD5 hash algorithm).
Chapter 34 Certificates
503

Advertisement

Table of Contents
loading

Table of Contents