Allied Telesis AT-S63 User Manual

Page 10

Advertising
background image

Contents

10

Chapter 34: Encryption Keys ......................................................................................................................393
Supported Platforms .......................................................................................................................................394
Overview .........................................................................................................................................................395
Encryption Key Length....................................................................................................................................396
Encryption Key Guidelines..............................................................................................................................397
Technical Overview.........................................................................................................................................398

Data Encryption ........................................................................................................................................398
Data Authentication ..................................................................................................................................400
Key Exchange Algorithms ........................................................................................................................401

Chapter 35: PKI Certificates and SSL ........................................................................................................403
Supported Platforms .......................................................................................................................................404
Overview .........................................................................................................................................................405
Types of Certificates .......................................................................................................................................405
Distinguished Names ......................................................................................................................................407
SSL and Enhanced Stacking ..........................................................................................................................409
Guidelines .......................................................................................................................................................410
Technical Overview.........................................................................................................................................411

SSL Encryption.........................................................................................................................................411
User Verification .......................................................................................................................................412
Authentication...........................................................................................................................................412
Public Key Infrastructure ..........................................................................................................................413
Public Keys...............................................................................................................................................413
Message Encryption .................................................................................................................................413
Digital Signatures .....................................................................................................................................413
Certificates................................................................................................................................................414
Elements of a Public Key Infrastructure ...................................................................................................415
Certificate Validation.................................................................................................................................416
Certificate Revocation Lists (CRLs)..........................................................................................................416
PKI Implementation ..................................................................................................................................417

Chapter 36: Secure Shell (SSH) ..................................................................................................................419
Supported Platforms .......................................................................................................................................420
Overview .........................................................................................................................................................421
Support for SSH..............................................................................................................................................422
SSH Server .....................................................................................................................................................423
SSH Clients.....................................................................................................................................................424
SSH and Enhanced Stacking..........................................................................................................................425
SSH Configuration Guidelines ........................................................................................................................427
General Steps to Configuring SSH .................................................................................................................428

Chapter 37: TACACS+ and RADIUS Protocols .........................................................................................429
Supported Platforms .......................................................................................................................................430
Overview .........................................................................................................................................................431
Guidelines .......................................................................................................................................................433

Chapter 38: Management Access Control List ..........................................................................................437
Supported Platforms .......................................................................................................................................438
Overview .........................................................................................................................................................439
Parts of a Management ACE ..........................................................................................................................440

IP Address ................................................................................................................................................440
Mask .........................................................................................................................................................440
Application ................................................................................................................................................440

Guidelines .......................................................................................................................................................441
Examples ........................................................................................................................................................442

Advertising