User Guide
Page 235
...the following benefits. • The ZyXEL Device only has to store the... about the topics covered in this chapter. 13.3.1 Certificates Overview The ZyXEL Device can then use the certification authority's public key to verify the certificates.... One key is private and must be made openly available. The ZyXEL Device uses certificates based on public-private key pairs. Certificates are often ...certificate contains the certificate owner's identity and public key. For example, a VPN tunnel might use the triple DES encryption algorithm. The certification authority uses its private ...
...the following benefits. • The ZyXEL Device only has to store the... about the topics covered in this chapter. 13.3.1 Certificates Overview The ZyXEL Device can then use the certification authority's public key to verify the certificates.... One key is private and must be made openly available. The ZyXEL Device uses certificates based on public-private key pairs. Certificates are often ...certificate contains the certificate owner's identity and public key. For example, a VPN tunnel might use the triple DES encryption algorithm. The certification authority uses its private ...