Table of Contents

45.1.2 Before You Begin ...................................................................................................

759

45.1.3 Example: Selecting a VPN Authentication Method ................................................

759

45.2 Authentication Method Objects ........................................................................................

760

45.2.1 Creating an Authentication Method Object ............................................................

761

Chapter 46

 

 

Certificates ............................................................................................................................

765

 

46.1

Overview ..........................................................................................................................

765

 

 

46.1.1 What You Can Do in this Chapter ..........................................................................

765

 

 

46.1.2 What You Need to Know ........................................................................................

765

 

 

46.1.3 Verifying a Certificate .............................................................................................

767

 

46.2

The My Certificates Screen .............................................................................................

769

 

 

46.2.1 The My Certificates Add Screen ............................................................................

770

 

 

46.2.2 The My Certificates Edit Screen .............................................................................

775

 

 

46.2.3 The My Certificates Import Screen ........................................................................

778

 

46.3

The Trusted Certificates Screen .....................................................................................

779

 

 

46.3.1 The Trusted Certificates Edit Screen ....................................................................

780

 

 

46.3.2 The Trusted Certificates Import Screen ................................................................

784

 

46.4

Certificates Technical Reference .....................................................................................

785

 

Chapter 47

 

 

ISP Accounts.........................................................................................................................

787

 

47.1

Overview ..........................................................................................................................

787

 

 

47.1.1 What You Can Do in this Chapter ..........................................................................

787

 

47.2

ISP Account Summary ....................................................................................................

787

 

 

47.2.1 ISP Account Edit ...................................................................................................

788

 

Chapter 48

 

 

SSL Application ....................................................................................................................

791

 

48.1

Overview ..........................................................................................................................

791

 

 

48.1.1 What You Can Do in this Chapter ..........................................................................

791

 

 

48.1.2 What You Need to Know ........................................................................................

791

 

 

48.1.3 Example: Specifying a Web Site for Access ..........................................................

792

 

48.2

The SSL Application Screen ............................................................................................

793

 

 

48.2.1 Creating/Editing a Web-based SSL Application Object

......................................... 794

 

 

48.2.2 Creating/Editing a File Sharing SSL Application Object

......................................... 796

 

Chapter 49

 

 

Endpoint Security .................................................................................................................

799

 

49.1

Overview ..........................................................................................................................

799

 

 

49.1.1 What You Can Do in this Chapter ..........................................................................

800

 

 

49.1.2 What You Need to Know ........................................................................................

800

 

49.2

Endpoint Security Screen ................................................................................................

801

 

 

 

 

 

26

 

 

 

 

 

 

ZyWALL USG 300 User’s Guide