Allied-telesis AT-S62 Manual de usuario Pagina 12

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 760
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 11
Table of Contents
12
Section VII
Management Security
...................................................................................................................... 629
Chapter 31
Web Server .........................................................................................................................................................................................................630
Web Server Overview .......................................................................................................................................................................................631
Supported Protocols ............................................................................................................................................................................... 631
General Steps to Configuring the Web Server for Encryption ................................................................................................. 632
Configuring the Web Server ..........................................................................................................................................................................634
Chapter 32
Encryption Keys ...............................................................................................................................................................................................636
Basic Overview ...................................................................................................................................................................................................637
Encryption Key Length .......................................................................................................................................................................... 638
Encryption Key Guidelines ................................................................................................................................................................... 638
Technical Overview ...........................................................................................................................................................................................639
Data Encryption ........................................................................................................................................................................................ 639
Data Authentication ............................................................................................................................................................................... 641
Key Exchange Algorithms ..................................................................................................................................................................... 642
Creating an Encryption Key ...........................................................................................................................................................................644
Deleting an Encryption Key ...........................................................................................................................................................................648
Modifying an Encryption Key ........................................................................................................................................................................649
Exporting an Encryption Key .........................................................................................................................................................................650
Importing an Encryption Key ........................................................................................................................................................................652
Chapter 33
Public Key Infrastructure Certificates ...................................................................................................................................................654
Basic Overview ...................................................................................................................................................................................................655
Types of Certificates ................................................................................................................................................................................ 655
Distinguished Names ............................................................................................................................................................................. 656
SSL and Enhanced Stacking ................................................................................................................................................................. 658
Guidelines ................................................................................................................................................................................................... 659
Technical Overview ...........................................................................................................................................................................................660
SSL Encryption .......................................................................................................................................................................................... 660
User Verification ....................................................................................................................................................................................... 661
Authentication .......................................................................................................................................................................................... 662
Public Key Infrastructure ....................................................................................................................................................................... 662
Public Keys ................................................................................................................................................................................................. 662
Message Encryption ................................................................................................................................................................................ 662
Digital Signatures .................................................................................................................................................................................... 663
Certificates .................................................................................................................................................................................................. 663
Elements of a Public Key Infrastructure ........................................................................................................................................... 664
Certificate Validation .............................................................................................................................................................................. 665
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 666
PKI Implementation ................................................................................................................................................................................ 666
Creating a Self-signed Certificate ................................................................................................................................................................668
Adding a Certificate to the Database .........................................................................................................................................................672
Modifying a Certificate ....................................................................................................................................................................................675
Deleting a Certificate .......................................................................................................................................................................................677
Viewing a Certificate ........................................................................................................................................................................................678
Generating an Enrollment Request ............................................................................................................................................................681
Installing CA Certificates onto a Switch ....................................................................................................................................................684
Configuring PKI ..................................................................................................................................................................................................685
Configuring SSL ..................................................................................................................................................................................................686
Vista de pagina 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 759 760

Comentarios a estos manuales

Sin comentarios