|
| Chapter 14 Certificates |
| Table 63 Trusted CA Details (continued) | |
| LABEL | DESCRIPTION |
| SHA1 Fingerprint | This is the certificate’s message digest that the ZyXEL Device calculated using |
|
| the SHA1 algorithm. You cannot use this value to verify that this is the remote |
|
| host’s actual certificate because the ZyXEL Device has signed the certificate; |
|
| thus causing this value to be different from that of the remote host’s actual |
|
| certificate. See Section 14.3 on page 158 for how to verify a remote host’s |
|
| certificate before you import it into the ZyXEL Device. |
|
|
|
| Certificate in PEM | This |
| Enhanced Mail (PEM) format. PEM uses 64 ASCII characters to convert the | |
| Format | binary certificate into a printable form. |
|
| You can copy and paste the certificate into an |
|
| colleagues or you can copy and paste the certificate into a text editor and save |
|
| the file on a management computer for later distribution (via floppy disk for |
|
| example). |
|
|
|
| Export | Click this button and then Save in the File Download screen. The Save As |
|
| screen opens, browse to the location that you want to use and click Save. |
|
|
|
| Apply | Click Apply to save your changes. You can only change the name and/or set |
|
| whether or not you want the ZyXEL Device to check the CRL that the |
|
| certification authority issues before trusting a certificate issued by the |
|
| certification authority. |
|
|
|
| Cancel | Click Cancel to quit and return to the Trusted CAs screen. |
|
|
|
| 173 |
ZyXEL | |
|
|