beautypg.com

Part iv: advanced – ZyXEL Communications ZyWALL 2 Plus User Manual

Page 15

background image

Table of Contents

ZyWALL 2 Plus User’s Guide

15

15.3 Verifying a Certificate ....................................................................................................... 296

15.3.1 Checking the Fingerprint of a Certificate on Your Computer .................................. 296

15.4 Configuration Summary ................................................................................................... 297
15.5 My Certificates ................................................................................................................ 298
15.6 My Certificate Details ..................................................................................................... 300
15.7 My Certificate Export ...................................................................................................... 302

15.7.1 Certificate File Export Formats ............................................................................... 302

15.8 My Certificate Import ..................................................................................................... 303

15.8.1 Certificate File Formats .......................................................................................... 303

15.9 My Certificate Create ..................................................................................................... 305
15.10 Trusted CAs ................................................................................................................. 310
15.11 Trusted CA Details ........................................................................................................ 312
15.12 Trusted CA Import ....................................................................................................... 314
15.13 Trusted Remote Hosts ................................................................................................. 315
15.14 Trusted Remote Host Certificate Details ..................................................................... 316
15.15 Trusted Remote Hosts Import ...................................................................................... 319
15.16 Directory Servers .......................................................................................................... 320
15.17 Directory Server Add or Edit ........................................................................................ 321

Chapter 16
Authentication Server........................................................................................................... 323

16.1 Authentication Server Overview ...................................................................................... 323

16.1.1 Local User Database .............................................................................................. 323
16.1.2 RADIUS .................................................................................................................. 323
16.1.3 Types of RADIUS Messages .................................................................................. 323

16.2 Local User Database ..................................................................................................... 324
16.3 RADIUS ......................................................................................................................... 326

Part IV: Advanced ................................................................................ 329

Chapter 17
Network Address Translation (NAT).................................................................................... 331

17.1 NAT Overview ................................................................................................................ 331

17.1.1 NAT Definitions ...................................................................................................... 331
17.1.2 What NAT Does ..................................................................................................... 332
17.1.3 How NAT Works ..................................................................................................... 332
17.1.4 NAT Application ...................................................................................................... 333
17.1.5 Port Restricted Cone NAT ...................................................................................... 334
17.1.6 NAT Mapping Types ............................................................................................... 334

17.2 Using NAT ........................................................................................................................ 335

17.2.1 SUA (Single User Account) Versus NAT ................................................................ 335