LABEL
SHA1 Fingerprint
Certificate in PEM
(Base-64) Encoded
Format
Export
Apply
Cancel
16.12 Trusted Remote Hosts
Click CERTIFICATES, Trusted Remote Hosts to open the Trusted Remote Hosts screen (see the
following figure). This screen displays a list of the certificates of peers that you trust but which are not
signed by one of the certification authorities on the Trusted CAs screen.
You do not need to add any certificate that is signed by one of the certification authorities on the Trusted
CAs screen since the ZyWALL automatically accepts any valid certificate signed by a trusted certification
authority as being trustworthy.
Certificates
Table 16-6 Trusted CA Details
This is the certificate's message digest that the ZyWALL calculated using the
SHA1 algorithm. You can use this value to verify with the certification authority
(over the phone for example) that this is actually their certificate.
This read-only text box displays the certificate or certification request in Privacy
Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the
binary certificate into a printable form.
You can copy and paste the certificate into an e-mail to send to friends or
colleagues or you can copy and paste the certificate into a text editor and save
the file on a management computer for later distribution (via floppy disk for
example).
Click this button and then Save in the File Download screen. The Save As
screen opens, browse to the location that you want to use and click Save.
Click Apply to save your changes back to the ZyWALL. You can only change the
name and/or set whether or not you want the ZyWALL to check the CRL that the
certification authority issues before trusting a certificate issued by the certification
authority.
Click Cancel to quit and return to the Trusted CAs screen.
ZyWALL Series Internet Security Gateway
DESCRIPTION
16-23