Table of Contents

40.1.2 Before You Begin ...................................................................................................

627

40.1.3 Example: Selecting a VPN Authentication Method ................................................

627

40.2 Authentication Method Objects ........................................................................................

628

40.2.1 Creating an Authentication Method Object ............................................................

629

Chapter 41

 

 

Certificates ............................................................................................................................

633

 

41.1

Overview ..........................................................................................................................

633

 

 

41.1.1 What You Can Do in this Chapter ..........................................................................

633

 

 

41.1.2 What You Need to Know ........................................................................................

633

 

 

41.1.3 Verifying a Certificate .............................................................................................

635

 

41.2

The My Certificates Screen .............................................................................................

637

 

 

41.2.1 The My Certificates Add Screen ............................................................................

638

 

 

41.2.2 The My Certificates Edit Screen .............................................................................

643

 

 

41.2.3 The My Certificates Import Screen ........................................................................

646

 

41.3

The Trusted Certificates Screen .....................................................................................

647

 

 

41.3.1 The Trusted Certificates Edit Screen ....................................................................

648

 

 

41.3.2 The Trusted Certificates Import Screen ................................................................

652

 

41.4

Certificates Technical Reference .....................................................................................

653

 

Chapter 42

 

 

ISP Accounts.........................................................................................................................

655

 

42.1

Overview ..........................................................................................................................

655

 

 

42.1.1 What You Can Do in this Chapter ..........................................................................

655

 

42.2

ISP Account Summary ....................................................................................................

655

 

 

42.2.1 ISP Account Edit ...................................................................................................

656

 

Chapter 43

 

 

SSL Application ....................................................................................................................

659

 

43.1

Overview ..........................................................................................................................

659

 

 

43.1.1 What You Can Do in this Chapter ..........................................................................

659

 

 

43.1.2 What You Need to Know ........................................................................................

659

 

 

43.1.3 Example: Specifying a Web Site for Access ..........................................................

660

 

43.2

The SSL Application Screen ............................................................................................

661

 

 

43.2.1 Creating/Editing a Web-based SSL Application Object .........................................

662

 

Chapter 44

 

 

Endpoint Security .................................................................................................................

665

 

44.1

Overview ..........................................................................................................................

665

 

 

44.1.1 What You Can Do in this Chapter ..........................................................................

666

 

 

44.1.2 What You Need to Know ........................................................................................

666

 

44.2

Endpoint Security Screen ................................................................................................

667

 

44.3

Endpoint Security Add/Edit ..............................................................................................

669

 

 

 

 

 

24

 

 

 

 

 

 

ZyWALL USG 50 User’s Guide