ZyXEL Communications NWA3000-N User Manual page 172

Nwa3000-n series wireless n business wlan access point
Hide thumbs Also See for NWA3000-N:
Table of Contents

Advertisement

Chapter 14 Certificates
Table 67 Configuration > Object > Certificate > Trusted Certificates > Edit (continued)
LABEL
Issuer
Signature Algorithm
Valid From
Valid To
Key Algorithm
Subject Alternative
Name
Key Usage
Basic Constraint
MD5 Fingerprint
SHA1 Fingerprint
Certificate
Export Certificate
OK
Cancel
172
DESCRIPTION
This field displays identifying information about the certificate's issuing
certification authority, such as Common Name, Organizational Unit,
Organization and Country.
With self-signed certificates, this is the same information as in the Subject
Name field.
This field displays the type of algorithm that was used to sign the certificate.
Some certification authorities use rsa-pkcs1-sha1 (RSA public-private key
encryption algorithm and the SHA1 hash algorithm). Other certification
authorities may use rsa-pkcs1-md5 (RSA public-private key encryption
algorithm and the MD5 hash algorithm).
This field displays the date that the certificate becomes applicable. The text
displays in red and includes a Not Yet Valid! message if the certificate has not
yet become applicable.
This field displays the date that the certificate expires. The text displays in red
and includes an Expiring! or Expired! message if the certificate is about to
expire or has already expired.
This field displays the type of algorithm that was used to generate the
certificate's key pair (the device uses RSA encryption) and the length of the
key set in bits (1024 bits for example).
This field displays the certificate's owner's IP address (IP), domain name
(DNS) or e-mail address (EMAIL).
This field displays for what functions the certificate's key can be used. For
example, "DigitalSignature" means that the key can be used to sign
certificates and "KeyEncipherment" means that the key can be used to encrypt
text.
This field displays general information about the certificate. For example,
Subject Type=CA means that this is a certification authority's certificate and
"Path Length Constraint=1" means that there can only be one certification
authority in the certificate's path.
This is the certificate's message digest that the device calculated using the
MD5 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
This is the certificate's message digest that the device calculated using the
SHA1 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
This read-only text box displays the certificate or certification request in
Privacy Enhanced Mail (PEM) format. PEM uses lowercase letters, uppercase
letters and numerals to convert a binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Click this button and then Save in the File Download screen. The Save As
screen opens, browse to the location that you want to use and click Save.
Click OK to save your changes back to the device. You can only change the
name.
Click Cancel to quit and return to the Trusted Certificates screen.
NWA3000-N Series User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Nwa3560-nNwa3160-nNwa3550-n

Table of Contents