Table of Contents
ZyWALL 5/35/70 Series User’s Guide
19
18.10.2 Authentication and the Security Parameter Index (SPI) ....................................... 380
18.11 VPN Rules (Manual) ...................................................................................................... 380
18.12 VPN Rules (Manual): Edit ........................................................................................... 382
18.13 VPN SA Monitor ........................................................................................................... 385
18.14 VPN Global Setting ....................................................................................................... 385
18.14.1 Local and Remote IP Address Conflict Resolution .............................................. 385
18.15 Telecommuter VPN/IPSec Examples ............................................................................ 388
18.15.1 Telecommuters Sharing One VPN Rule Example ................................................ 389
18.15.2 Telecommuters Using Unique VPN Rules Example ............................................. 389
18.16 VPN and Remote Management ..................................................................................... 391
18.17 Hub-and-spoke VPN ...................................................................................................... 391
18.17.1 Hub-and-spoke VPN Example ............................................................................. 392
18.17.2 Hub-and-spoke Example VPN Rule Addresses ................................................... 393
18.17.3 Hub-and-spoke VPN Requirements and Suggestions ......................................... 393
Chapter 19
Certificates ............................................................................................................................395
19.1 Certificates Overview ....................................................................................................... 395
19.1.1 Advantages of Certificates ..................................................................................... 396
19.2 Self-signed Certificates .................................................................................................... 396
19.3 Verifying a Certificate ....................................................................................................... 396
19.3.1 Checking the Fingerprint of a Certificate on Your Computer .................................. 396
19.4 Configuration Summary ................................................................................................... 397
19.5 My Certificates ................................................................................................................ 398
19.6 My Certificate Details ..................................................................................................... 400
19.7 My Certificate Export ...................................................................................................... 402
19.7.1 Certificate File Export Formats ............................................................................... 402
19.8 My Certificate Import ..................................................................................................... 403
19.8.1 Certificate File Formats .......................................................................................... 403
19.9 My Certificate Create ..................................................................................................... 405
19.10 Trusted CAs ................................................................................................................. 410
19.11 Trusted CA Details ........................................................................................................ 412
19.12 Trusted CA Import ....................................................................................................... 415
19.13 Trusted Remote Hosts ................................................................................................. 416
19.14 Trusted Remote Hosts Import ...................................................................................... 418
19.15 Trusted Remote Host Certificate Details ..................................................................... 419
19.16 Directory Servers .......................................................................................................... 421
19.17 Directory Server Add or Edit ........................................................................................ 422
Chapter 20
Authentication Server...........................................................................................................425
20.1 Authentication Server Overview ...................................................................................... 425
20.1.1 Local User Database .............................................................................................. 425