ZyXEL SBG3300-N Series User Guide - Page 197
Certificates
![]() |
View all ZyXEL SBG3300-N Series manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 197 highlights
CHAPTER 18 Certificates 18.1 Overview The Device can use certificates (also called digital IDs) to authenticate users. Certificates are based on public-private key pairs. A certificate contains the certificate owner's identity and public key. Certificates provide a way to exchange public keys for use in authentication. 18.1.1 What You Can Do in this Chapter • The Local Certificates screen lets you generate certification requests and import the Device's CA-signed certificates (Section 18.4 on page 201). • The Trusted CA screen lets you save the certificates of trusted CAs to the Device (Section 18.4 on page 201). 18.2 What You Need to Know The following terms and concepts may help as you read through this chapter. Certification Authority A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner. There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities. The certification authority uses its private key to sign certificates. Anyone can then use the certification authority's public key to verify the certificates. You can use the Device to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. SBG3300-N Series User's Guide 197
![](/manual_guide/products/zyxel-sbg3300n-series-user-guide-222663b/197.png)