ZyXEL Communications NWA3000-N User Manual page 171

Nwa3000-n series wireless n business wlan access point
Hide thumbs Also See for NWA3000-N:
Table of Contents

Advertisement

The following table describes the labels in this screen.
Table 67 Configuration > Object > Certificate > Trusted Certificates > Edit
LABEL
Name
Certification Path
Refresh
Enable X.509v3 CRL
Distribution Points
and OCSP checking
OCSP Server
URL
ID
Password
LDAP Server
Address
Port
ID
Password
Certificate
Information
Type
Version
Serial Number
Subject
NWA3000-N Series User's Guide
DESCRIPTION
This field displays the identifying name of this certificate. You can change the
name. You can use up to 31 alphanumeric and ;'~!@#$%^&()_+[]{}',.=-
characters.
Click the Refresh button to have this read-only text box display the end
entity's certificate and a list of certification authority certificates that shows
the hierarchy of certification authorities that validate the end entity's
certificate. If the issuing certification authority is one that you have imported
as a trusted certificate, it may be the only certification authority in the list
(along with the end entity's own certificate). The device does not trust the end
entity's certificate and displays "Not trusted" in this field if any certificate on
the path has expired or been revoked.
Click Refresh to display the certification path.
Select this check box to have the device check incoming certificates that are
signed by this certificate against a Certificate Revocation List (CRL) or an OCSP
server. You also need to configure the OSCP or LDAP server details.
Select this check box if the directory server uses OCSP (Online Certificate
Status Protocol).
Type the protocol, IP address and pathname of the OCSP server.
The device may need to authenticate itself in order to assess the OCSP server.
Type the login name (up to 31 ASCII characters) from the entity maintaining
the server (usually a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the
OCSP server (usually a certification authority).
Select this check box if the directory server uses LDAP (Lightweight Directory
Access Protocol). LDAP is a protocol over TCP that specifies how clients access
directories of certificates and lists of revoked certificates.
Type the IP address (in dotted decimal notation) of the directory server.
Use this field to specify the LDAP server port number. You must use the same
server port number that the directory server uses. 389 is the default server
port number for LDAP.
The device may need to authenticate itself in order to assess the CRL directory
server. Type the login name (up to 31 ASCII characters) from the entity
maintaining the server (usually a certification authority).
Type the password (up to 31 ASCII characters) from the entity maintaining the
CRL directory server (usually a certification authority).
These read-only fields display detailed information about the certificate.
This field displays general information about the certificate. CA-signed means
that a Certification Authority signed the certificate. Self-signed means that the
certificate's owner signed the certificate (not a certification authority). X.509
means that this certificate was created and signed according to the ITU-T
X.509 recommendation that defines the formats for public-key certificates.
This field displays the X.509 version number.
This field displays the certificate's identification number given by the
certification authority.
This field displays information that identifies the owner of the certificate, such
as Common Name (CN), Organizational Unit (OU), Organization (O) and
Country (C).
Chapter 14 Certificates
171

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa3560-nNwa3160-nNwa3550-n

Table of Contents