Allied-telesis AT-S62 Manual de usuario Pagina 11

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 822
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 10
AT-S62 Management Software Menus Interface User’s Guide
11
Section VII: Management Security ....................................................................... 679
Chapter 30: Web Server .............................................................................................................................. 681
Web Server Overview..................................................................................................................................... 682
Supported Protocols................................................................................................................................. 682
Configuring the Web Server ........................................................................................................................... 683
General Steps to Configuring the Web Server for Encryption ........................................................................ 685
General Steps for a Self-signed Certificate.............................................................................................. 685
General Steps for a Public or Private CA Certificate................................................................................ 685
Chapter 31: Encryption Keys ..................................................................................................................... 687
Basic Overview............................................................................................................................................... 688
Encryption Key Length ............................................................................................................................. 689
Encryption Key Guidelines ....................................................................................................................... 689
Technical Overview ........................................................................................................................................ 690
Data Encryption........................................................................................................................................ 690
Data Authentication.................................................................................................................................. 692
Key Exchange Algorithms ........................................................................................................................ 693
Creating an Encryption Key............................................................................................................................ 695
Deleting an Encryption Key ............................................................................................................................ 699
Modifying an Encryption Key .......................................................................................................................... 700
Exporting an Encryption Key .......................................................................................................................... 701
Importing an Encryption Key .......................................................................................................................... 703
Chapter 32: PKI Certificates and SSL ........................................................................................................ 705
Basic Overview............................................................................................................................................... 706
Types of Certificates ................................................................................................................................ 706
Distinguished Names ............................................................................................................................... 707
SSL and Enhanced Stacking ................................................................................................................... 709
Guidelines ................................................................................................................................................ 710
Technical Overview ........................................................................................................................................ 711
SSL Encryption ........................................................................................................................................ 711
User Verification....................................................................................................................................... 712
Authentication .......................................................................................................................................... 712
Public Key Infrastructure .......................................................................................................................... 713
Public Keys .............................................................................................................................................. 713
Message Encryption................................................................................................................................. 713
Digital Signatures..................................................................................................................................... 713
Certificates ............................................................................................................................................... 714
Elements of a Public Key Infrastructure................................................................................................... 715
Certificate Validation ................................................................................................................................ 715
Certificate Revocation Lists (CRLs) ......................................................................................................... 716
PKI Implementation.................................................................................................................................. 716
Creating a Self-signed Certificate................................................................................................................... 718
Adding a Certificate to the Database.............................................................................................................. 722
Modifying a Certificate .................................................................................................................................... 725
Deleting a Certificate ...................................................................................................................................... 727
Viewing a Certificate....................................................................................................................................... 728
Generating an Enrollment Request ................................................................................................................ 730
Installing CA Certificates onto a Switch.......................................................................................
................... 733
Configuring PKI .............................................................................................................................................. 734
Configuring SSL ............................................................................................................................................. 735
Vista de pagina 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 821 822

Comentarios a estos manuales

Sin comentarios