User Guide
Page 212
...15 Certificates The Device uses certificates based on public-key cryptology to authenticate users attempting to verify the certificates. For example, a VPN tunnel might use the certification authority's public key to establish a connection. Anyone can check a peer's certificate against a directory ...A certification path is called a CRL (Certificate Revocation List). A directory of the imported trusted CA certificates. 212 P-2812HNU(L)-Fx Series User's Guide The framework of servers, software, procedures and policies that handles keys is the hierarchy of valid and revoked...
...15 Certificates The Device uses certificates based on public-key cryptology to authenticate users attempting to verify the certificates. For example, a VPN tunnel might use the certification authority's public key to establish a connection. Anyone can check a peer's certificate against a directory ...A certification path is called a CRL (Certificate Revocation List). A directory of the imported trusted CA certificates. 212 P-2812HNU(L)-Fx Series User's Guide The framework of servers, software, procedures and policies that handles keys is the hierarchy of valid and revoked...