Table of Contents

15.3

Verifying a Certificate .......................................................................................................

296

15.3.1 Checking the Fingerprint of a Certificate on Your Computer ..................................

296

15.4

Configuration Summary ...................................................................................................

297

15.5

My Certificates ................................................................................................................

298

15.6

My Certificate Details .....................................................................................................

300

15.7

My Certificate Export ......................................................................................................

302

15.7.1 Certificate File Export Formats ...............................................................................

302

15.8

My Certificate Import .....................................................................................................

303

15.8.1 Certificate File Formats ..........................................................................................

303

15.9

My Certificate Create .....................................................................................................

305

15.10 Trusted CAs .................................................................................................................

310

15.11 Trusted CA Details ........................................................................................................

312

15.12 Trusted CA Import .......................................................................................................

314

15.13 Trusted Remote Hosts .................................................................................................

315

15.14 Trusted Remote Host Certificate Details .....................................................................

316

15.15 Trusted Remote Hosts Import ......................................................................................

319

15.16 Directory Servers ..........................................................................................................

320

15.17 Directory Server Add or Edit ........................................................................................

321

Chapter 16

 

Authentication Server...........................................................................................................

323

16.1

Authentication Server Overview ......................................................................................

323

16.1.1 Local User Database ..............................................................................................

323

16.1.2 RADIUS ..................................................................................................................

323

16.1.3 Types of RADIUS Messages ..................................................................................

323

16.2

Local User Database .....................................................................................................

324

16.3 RADIUS .........................................................................................................................

326

Part IV: Advanced ................................................................................

329

Chapter 17

 

Network Address Translation (NAT)....................................................................................

331

17.1

NAT Overview ................................................................................................................

331

17.1.1 NAT Definitions ......................................................................................................

331

17.1.2 What NAT Does .....................................................................................................

332

17.1.3 How NAT Works .....................................................................................................

332

17.1.4 NAT Application ......................................................................................................

333

17.1.5 Port Restricted Cone NAT ......................................................................................

334

17.1.6 NAT Mapping Types ...............................................................................................

334

17.2

Using NAT ........................................................................................................................

335

17.2.1 SUA (Single User Account) Versus NAT ................................................................

335

 

15

ZyWALL 2 Plus User’s Guide