Allied Telesis AT-S63 User Manual

Page 12

Advertising
background image

Contents

12

Configuring Authenticator Port Parameters ....................................................................................................739
Configuring Supplicant Port Parameters.........................................................................................................745
Displaying the Port Access Parameters..........................................................................................................748
Configuring RADIUS Accounting ....................................................................................................................750

Section VIII: Management Security ......................................................................753

Chapter 32: Web Server ..............................................................................................................................755
Web Server Overview .....................................................................................................................................756

Supported Protocols .................................................................................................................................756

Configuring the Web Server............................................................................................................................757
General Steps for Configuring the Web Server for Encryption .......................................................................760

General Steps for a Self-signed Certificate ..............................................................................................760
General Steps for a Public or Private CA Certificate ................................................................................760

Chapter 33: Encryption Keys ......................................................................................................................763
Basic Overview ...............................................................................................................................................764

Encryption Key Length .............................................................................................................................765
Encryption Key Guidelines .......................................................................................................................765

Technical Overview.........................................................................................................................................766

Data Encryption ........................................................................................................................................766
Data Authentication ..................................................................................................................................768
Key Exchange Algorithms ........................................................................................................................769

Creating an Encryption Key ............................................................................................................................771
Deleting an Encryption Key.............................................................................................................................775
Modifying an Encryption Key ..........................................................................................................................776
Exporting an Encryption Key...........................................................................................................................777
Importing an Encryption Key...........................................................................................................................780
Displaying the Encryption Keys ......................................................................................................................783

Chapter 34: PKI Certificates and SSL ........................................................................................................785
Basic Overview ...............................................................................................................................................786

Types of Certificates.................................................................................................................................786
Distinguished Names................................................................................................................................787
SSL and Enhanced Stacking....................................................................................................................788
Guidelines.................................................................................................................................................789

Technical Overview.........................................................................................................................................790

SSL Encryption.........................................................................................................................................790
User Verification .......................................................................................................................................791
Authentication...........................................................................................................................................792
Public Key Infrastructure ..........................................................................................................................792
Public Keys...............................................................................................................................................792
Message Encryption .................................................................................................................................792
Digital Signatures .....................................................................................................................................792
Certificates................................................................................................................................................793
Elements of a Public Key Infrastructure ...................................................................................................794
Certificate Validation.................................................................................................................................795
Certificate Revocation Lists (CRLs)..........................................................................................................795
PKI Implementation ..................................................................................................................................796

Creating a Self-signed Certificate ...................................................................................................................797
Adding a Certificate to the Database ..............................................................................................................801
Modifying a Certificate ....................................................................................................................................804
Deleting a Certificate.......................................................................................................................................807
Viewing a Certificate .......................................................................................................................................809
Generating an Enrollment Request.................................................................................................................812
Installing CA Certificates onto a Switch ..........................................................................................................815

Advertising