Table of Contents
15.3
Verifying a Certificate .......................................................................................................
296
15.3.1 Checking the Fingerprint of a Certificate on Your Computer ..................................
15.4
Configuration Summary ...................................................................................................
297
15.5
My Certificates ................................................................................................................
298
15.6
My Certificate Details .....................................................................................................
300
15.7
My Certificate Export ......................................................................................................
302
15.7.1 Certificate File Export Formats ...............................................................................
15.8
My Certificate Import .....................................................................................................
303
15.8.1 Certificate File Formats ..........................................................................................
15.9
My Certificate Create .....................................................................................................
305
15.10 Trusted CAs .................................................................................................................
310
15.11 Trusted CA Details ........................................................................................................
312
15.12 Trusted CA Import .......................................................................................................
314
15.13 Trusted Remote Hosts .................................................................................................
315
15.14 Trusted Remote Host Certificate Details .....................................................................
316
15.15 Trusted Remote Hosts Import ......................................................................................
319
15.16 Directory Servers ..........................................................................................................
320
15.17 Directory Server Add or Edit ........................................................................................
321
Chapter 16
Authentication Server...........................................................................................................
323
16.1
Authentication Server Overview ......................................................................................
16.1.1 Local User Database ..............................................................................................
16.1.2 RADIUS ..................................................................................................................
16.1.3 Types of RADIUS Messages ..................................................................................
16.2
Local User Database .....................................................................................................
324
16.3 RADIUS .........................................................................................................................
326
Part IV: Advanced ................................................................................
329
Chapter 17
Network Address Translation (NAT)....................................................................................
331
17.1
NAT Overview ................................................................................................................
17.1.1 NAT Definitions ......................................................................................................
17.1.2 What NAT Does .....................................................................................................
332
17.1.3 How NAT Works .....................................................................................................
17.1.4 NAT Application ......................................................................................................
333
17.1.5 Port Restricted Cone NAT ......................................................................................
334
17.1.6 NAT Mapping Types ...............................................................................................
17.2
Using NAT ........................................................................................................................
335
17.2.1 SUA (Single User Account) Versus NAT ................................................................
15
ZyWALL 2 Plus User’s Guide