Table of Contents
ZyWALL USG 50 User’s Guide
24
40.1.2 Before You Begin
...................................................................................................
627
40.1.3 Example: Selecting a VPN Authentication Method
................................................
627
40.2 Authentication Method Objects
........................................................................................
628
40.2.1 Creating an Authentication Method Object
............................................................
629
Chapter
41
Certificates
............................................................................................................................
633
41.1 Overview
..........................................................................................................................
633
41.1.1 What You Can Do in this Chapter
..........................................................................
633
41.1.2 What You Need to Know
........................................................................................
633
41.1.3 Verifying a Certificate
.............................................................................................
635
41.2 The My Certificates Screen
.............................................................................................
637
41.2.1 The My Certificates Add Screen
............................................................................
638
41.2.2 The My Certificates Edit Screen
.............................................................................
643
41.2.3 The My Certificates Import Screen
........................................................................
646
41.3 The Trusted Certificates Screen
.....................................................................................
647
41.3.1 The Trusted Certificates Edit Screen
....................................................................
648
41.3.2 The Trusted Certificates Import Screen
................................................................
652
41.4 Certificates Technical Reference
.....................................................................................
653
Chapter
42
ISP Accounts
.........................................................................................................................
655
42.1 Overview
..........................................................................................................................
655
42.1.1 What You Can Do in this Chapter
..........................................................................
655
42.2 ISP Account Summary
....................................................................................................
655
42.2.1 ISP Account Edit
...................................................................................................
656
Chapter
43
SSL Application
....................................................................................................................
659
43.1 Overview
..........................................................................................................................
659
43.1.1 What You Can Do in this Chapter
..........................................................................
659
43.1.2 What You Need to Know
........................................................................................
659
43.1.3 Example: Specifying a Web Site for Access
..........................................................
660
43.2 The SSL Application Screen
............................................................................................
661
43.2.1 Creating/Editing a Web-based SSL Application Object
.........................................
662
Chapter
44
Endpoint Security
.................................................................................................................
665
44.1 Overview
..........................................................................................................................
665
44.1.1 What You Can Do in this Chapter
..........................................................................
666
44.1.2 What You Need to Know
........................................................................................
666
44.2 Endpoint Security Screen
................................................................................................
667
44.3 Endpoint Security Add/Edit
..............................................................................................
669