ZyXEL Vantage CNM User Guide - Page 574
Certificate Management Overview
View all ZyXEL Vantage CNM manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 574 highlights
Chapter 30 CNM System Setting Table 257 CNM System Setting > Configuration > VRPT Management > Add/Edit LABEL DESCRIPTION Add Devices to VRPT Server Click the icon and the associated devices screen appears where you can select associated device(s) to this VRPT server. Click Add to return to the previous screen and the selected device(s) display in the Associated Devices field. When you click Apply, Vantage CNM automatically configures these devices to send log messages to this Vantage Report. It does not change any settings for log categories or traffic statistics, so you might have to change these manually. See VRPT User's Guide for more information. Apply Cancel To unassociate a device to the VRPT server, click the icon and unselect the associated device from the list. Then click Add. When you click Apply, Vantage CNM automatically resets the syslog settings to their default values for devices that previously used the specified Vantage Report server. It does not change any settings for log categories or traffic statistics. Click this to save these changes. Click this to return to the previous screen without saving changes. 30.7 Certificate Management Overview Some devices can provide certificates (also called digital IDs) for users to authenticate the device. Certificates are based on public-private key pairs. A certificate contains the certificate owner's identity and public key. Certificates provide a way to exchange public keys for use in authentication. A Certification Authority (CA) issues certificates and guarantees the identity of each certificate owner. There are commercial certification authorities like CyberTrust or VeriSign and government certification authorities. You can use the device to generate certification requests that contain identifying information and public keys and then send the certification requests to a certification authority. In public-key encryption and decryption, each host has two keys. One key is public and can be made openly available; the other key is private and must be kept secure. Public-key encryption in general works as follows. 1 Tim wants to send a private message to Jenny. Tim generates a public key pair. What is encrypted with one key can only be decrypted using the other. 2 Tim keeps the private key and makes the public key openly available. 3 Tim uses his private key to encrypt the message and sends it to Jenny. 574 Vantage CNM User's Guide