Allied Telesis AT-S63 User Manual

Page 10

Advertising
background image

Contents

10

RADIUS Accounting........................................................................................................................................397
General Steps .................................................................................................................................................398
Guidelines .......................................................................................................................................................399

Section IX: Management Security .........................................................................403

Chapter 34: Web Server ..............................................................................................................................405
Supported Platforms .......................................................................................................................................406
Overview .........................................................................................................................................................407

Supported Protocols .................................................................................................................................407

Configuring the Web Server for HTTP ............................................................................................................408
Configuring the Web Server for HTTPS..........................................................................................................409

General Steps for a Self-signed Certificate ..............................................................................................409
General Steps for a Public or Private CA Certificate ................................................................................409

Chapter 35: Encryption Keys ......................................................................................................................411
Supported Platforms .......................................................................................................................................412
Overview .........................................................................................................................................................413
Encryption Key Length....................................................................................................................................414
Encryption Key Guidelines..............................................................................................................................415
Technical Overview.........................................................................................................................................416

Data Encryption ........................................................................................................................................416
Data Authentication ..................................................................................................................................418
Key Exchange Algorithms ........................................................................................................................419

Chapter 36: PKI Certificates and SSL ........................................................................................................421
Supported Platforms .......................................................................................................................................422
Overview .........................................................................................................................................................423
Types of Certificates .......................................................................................................................................423
Distinguished Names ......................................................................................................................................425
SSL and Enhanced Stacking ..........................................................................................................................427
Guidelines .......................................................................................................................................................428
Technical Overview.........................................................................................................................................429

SSL Encryption.........................................................................................................................................429
User Verification .......................................................................................................................................430
Authentication...........................................................................................................................................430
Public Key Infrastructure ..........................................................................................................................431
Public Keys...............................................................................................................................................431
Message Encryption .................................................................................................................................431
Digital Signatures .....................................................................................................................................431
Certificates................................................................................................................................................432
Elements of a Public Key Infrastructure ...................................................................................................433
Certificate Validation.................................................................................................................................434
Certificate Revocation Lists (CRLs)..........................................................................................................434
PKI Implementation ..................................................................................................................................435

Chapter 37: Secure Shell (SSH) ..................................................................................................................437
Supported Platforms .......................................................................................................................................438
Overview .........................................................................................................................................................439
Support for SSH..............................................................................................................................................440
SSH Server .....................................................................................................................................................441
SSH Clients.....................................................................................................................................................442
SSH and Enhanced Stacking..........................................................................................................................443
SSH Configuration Guidelines ........................................................................................................................445
General Steps to Configuring SSH .................................................................................................................446

Advertising