|
| Chapter 15 Certificates |
| Table 78 SECURITY > CERTIFICATES > My Certificates > Details (continued) | |
| LABEL | DESCRIPTION |
| Type | This field displays general information about the certificate. |
|
| that a Certification Authority signed the certificate. |
|
| certificate’s owner signed the certificate (not a certification authority). “X.509” |
|
| means that this certificate was created and signed according to the |
|
| recommendation that defines the formats for |
|
|
|
| Version | This field displays the X.509 version number. |
|
|
|
| Serial Number | This field displays the certificate’s identification number given by the certification |
|
| authority or generated by the ZyWALL. |
|
|
|
| Subject | This field displays information that identifies the owner of the certificate, such as |
|
| Common Name (CN), Organizational Unit (OU), Organization (O) and Country |
|
| (C). |
|
|
|
| Issuer | This field displays identifying information about the certificate’s issuing |
|
| certification authority, such as Common Name, Organizational Unit, |
|
| Organization and Country. |
|
| With |
|
|
|
| Signature Algorithm | This field displays the type of algorithm that was used to sign the certificate. The |
|
| ZyWALL uses |
|
| the SHA1 hash algorithm). Some certification authorities may use |
|
| md5 (RSA |
|
|
|
| Valid From | This field displays the date that the certificate becomes applicable. The text |
|
| displays in red and includes a Not Yet Valid! message if the certificate has not |
|
| yet become applicable. |
|
|
|
| Valid To | This field displays the date that the certificate expires. The text displays in red |
|
| and includes an Expiring! or Expired! message if the certificate is about to expire |
|
| or has already expired. |
|
|
|
| Key Algorithm | This field displays the type of algorithm that was used to generate the |
|
| certificate’s key pair (the ZyWALL uses RSA encryption) and the length of the |
|
| key set in bits (1024 bits for example). |
|
|
|
| Subject Alternative | This field displays the certificate owner‘s IP address (IP), domain name (DNS) |
| Name | or |
|
|
|
| Key Usage | This field displays for what functions the certificate’s key can be used. For |
|
| example, “DigitalSignature” means that the key can be used to sign certificates |
|
| and “KeyEncipherment” means that the key can be used to encrypt text. |
|
|
|
| Basic Constraint | This field displays general information about the certificate. For example, |
|
| Subject Type=CA means that this is a certification authority’s certificate and |
|
| “Path Length Constraint=1” means that there can only be one certification |
|
| authority in the certificate’s path. |
|
|
|
| MD5 Fingerprint | This is the certificate’s message digest that the ZyWALL calculated using the |
|
| MD5 algorithm. |
|
|
|
| SHA1 Fingerprint | This is the certificate’s message digest that the ZyWALL calculated using the |
|
| SHA1 algorithm. |
|
|
|
| Certificate in PEM | This |
| Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the | |
| Format | binary certificate into a printable form. |
|
| You can copy and paste a certification request into a certification authority’s web |
|
| page, an |
|
| save the file on a management computer for later manual enrollment. |
|
| You can copy and paste a certificate into an |
|
| colleagues or you can copy and paste a certificate into a text editor and save the |
|
| file on a management computer for later distribution (via floppy disk for |
|
| example). |
|
|
|
| 301 |
ZyWALL 2 Plus User’s Guide | |
|
|