Table of Contents
ZyWALL USG 300 User’s Guide
26
45.1.2 Before You Begin ................................................................................................... 759
45.1.3 Example: Selecting a VPN Authentication Method ................................................ 759
45.2 Authentication Method Objects ........................................................................................ 760
45.2.1 Creating an Authentication Method Object ............................................................ 761
Chapter 46
Certificates ............................................................................................................................765
46.1 Overview .......................................................................................................................... 765
46.1.1 What You Can Do in this Chapter .......................................................................... 765
46.1.2 What You Need to Know ........................................................................................ 765
46.1.3 Verifying a Certificate ............................................................................................. 767
46.2 The My Certificates Screen ............................................................................................. 769
46.2.1 The My Certificates Add Screen ............................................................................ 770
46.2.2 The My Certificates Edit Screen ............................................................................. 775
46.2.3 The My Certificates Import Screen ........................................................................ 778
46.3 The Trusted Certificates Screen ..................................................................................... 779
46.3.1 The Trusted Certificates Edit Screen .................................................................... 780
46.3.2 The Trusted Certificates Import Screen ................................................................ 784
46.4 Certificates Technical Reference ..................................................................................... 785
Chapter 47
ISP Accounts.........................................................................................................................787
47.1 Overview .......................................................................................................................... 787
47.1.1 What You Can Do in this Chapter .......................................................................... 787
47.2 ISP Account Summary .................................................................................................... 787
47.2.1 ISP Account Edit ................................................................................................... 788
Chapter 48
SSL Application ....................................................................................................................791
48.1 Overview .......................................................................................................................... 791
48.1.1 What You Can Do in this Chapter .......................................................................... 791
48.1.2 What You Need to Know ........................................................................................ 791
48.1.3 Example: Specifying a Web Site for Access .......................................................... 792
48.2 The SSL Application Screen ............................................................................................ 793
48.2.1 Creating/Editing a Web-based SSL Application Object ......................................... 794
48.2.2 Creating/Editing a File Sharing SSL Application Object ......................................... 796
Chapter 49
Endpoint Security .................................................................................................................799
49.1 Overview .......................................................................................................................... 799
49.1.1 What You Can Do in this Chapter .......................................................................... 800
49.1.2 What You Need to Know ........................................................................................ 800
49.2 Endpoint Security Screen ................................................................................................ 801