
Chapter 31 Certificates
ZyWALL (ZLD) CLI Reference Guide
265
ca generate pkcs10 name certificate_name cn-
type {ip cn cn_address|fqdn cn
cn_domain_name|mail cn cn_email} [ou
organizational_unit] [o organization] [c
country] key-type {rsa|dsa} key-len key_length
Generates a PKCS#10 certification request.
ca generate pkcs12 name name password password Generates a PKCS#12 certificate.
ca generate x509 name certificate_name cn-type
{ip cn cn_address|fqdn cn cn_domain_name|mail
cn cn_email} [ou organizational_unit] [o
organization] [c country] key-type {rsa|dsa}
key-len key_length
Generates a self-signed x509 certificate.
ca rename category {local|remote} old_name
new_name
Renames a local (my certificates) or remote
(trusted certificates) certificate.
ca validation remote_certificate Enters the sub command mode for validation of
certificates signed by the specified remote (trusted)
certificates.
cdp {activate|deactivate} Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a Certificate Revocation List (CRL) or an
OCSP server. You also need to configure the
OSCP or LDAP server details.
ldap {activate|deactivate} Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a Certificate Revocation List (CRL) on a
LDAP (Lightweight Directory Access Protocol)
directory server.
ldap ip {ip|fqdn} port <1..65535> [id name
password password] [deactivate]
Sets the validation configuration for the specified
remote (trusted) certificate where the directory
server uses LDAP.
ip: Type the IP address (in dotted decimal
notation) or the domain name of the directory
server. The domain name can use alphanumeric
characters, periods and hyphens. Up to 255
characters.
port: Specify the LDAP server port number. You
must use the same server port number that the
directory server uses. 389 is the default server port
number for LDAP.
The ZyWALL may need to authenticate itself in
order to access the CRL directory server. Type the
login name (up to 31 characters) from the entity
maintaining the server (usually a certification
authority). You can use alphanumeric characters,
the underscore and the dash.
Type the password (up to 31 characters) from the
entity maintaining the CRL directory server (usually
a certification authority). You can use the following
characters: a-zA-Z0-9;|`~!@#$%^&*()_+\{}':,./<>=-
ocsp {activate|deactivate} Has the ZyWALL check (or not check) incoming
certificates that are signed by this certificate
against a directory server that uses OCSP (Online
Certificate Status Protocol).
Table 153 ca Commands Summary (continued)
COMMAND DESCRIPTION
Comentarios a estos manuales