Allied-telesis AT-S60 Manual de usuario Pagina 9

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 858
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 8
AT-S60 Management Software User’s Guide
9
Section V
Security Features
.....................................................................................................................................................................468
Chapter 21
Port Security ...................................................................................................................................................................................................... 469
Port Security Overview .................................................................................................................................................................................... 470
Automatic ................................................................................................................................................................................................... 470
Limited ........................................................................................................................................................................................................ 470
Secured ....................................................................................................................................................................................................... 471
Locked ......................................................................................................................................................................................................... 471
Security Violations and Intrusion Actions ....................................................................................................................................... 472
Configuring Port Security ............................................................................................................................................................................... 473
Chapter 22
Web Server ......................................................................................................................................................................................................... 477
Web Server Overview ...................................................................................................................................................................................... 478
Protocols Supported .............................................................................................................................................................................. 478
Configuring the Web Server for Security Features ............................................................................................................................... 479
Configuring SSL Certificates .......................................................................................................................................................................... 481
Configuring Self-Signed Certificates ................................................................................................................................................ 481
Configuring CA Certificates ................................................................................................................................................................. 482
Chapter 23
Encryption .......................................................................................................................................................................................................... 484
Encryption Overview ....................................................................................................................................................................................... 485
Data Encryption ................................................................................................................................................................................................. 486
Symmetrical Encryption ........................................................................................................................................................................ 486
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 487
Data Authentication ......................................................................................................................................................................................... 489
Key Exchange Algorithms .............................................................................................................................................................................. 490
Configuring Keys for Encryption ................................................................................................................................................................. 491
Configuring a Distinguished Name and Keys ............................................................................................................................... 491
Modifying and Deleting Keys .............................................................................................................................................................. 495
Exporting Keys .......................................................................................................................................................................................... 497
Importing Keys ......................................................................................................................................................................................... 498
Chapter 24
Public Key Infrastructure (PKI) .................................................................................................................................................................501
Public Key Infrastructure Overview ............................................................................................................................................................ 502
Public Keys ................................................................................................................................................................................................. 502
Message Encryption ............................................................................................................................................................................... 503
Digital Signatures .................................................................................................................................................................................... 503
Certificates ................................................................................................................................................................................................. 503
Elements of a Public Key Infrastructure ........................................................................................................................................... 504
Certificate Validation .............................................................................................................................................................................. 505
Certificate Revocation Lists (CRLs) .................................................................................................................................................... 506
PKI Implementation ......................................................................................................................................................................................... 507
PKI Standards ............................................................................................................................................................................................ 507
Certificate Retrieval and Storage ....................................................................................................................................................... 507
Configuring Certificates .................................................................................................................................................................................. 508
Creating Certificates ............................................................................................................................................................................... 508
Adding Certificates to the Database ................................................................................................................................................ 513
Deleting and Modifying Certificates ................................................................................................................................................ 515
Viewing Certificates ................................................................................................................................................................................ 518
Generating Enrollment Requests ................................................................................................................................................................ 521
Vista de pagina 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 857 858

Comentarios a estos manuales

Sin comentarios