Allied Telesis AT-S63 User Manual

Page 11

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

11

Adding Static Unicast and Multicast MAC Addresses .................................................................................... 678
Deleting Unicast and Multicast MAC Addresses ............................................................................................ 680
Deleting All Dynamic MAC Addresses ........................................................................................................... 681
Changing the Aging Time ............................................................................................................................... 682

Section VII: Management Security ....................................................................... 683

Chapter 30: Web Server .............................................................................................................................. 685
Web Server Overview..................................................................................................................................... 686

Supported Protocols................................................................................................................................. 686

Configuring the Web Server ........................................................................................................................... 687
General Steps for Configuring the Web Server for Encryption....................................................................... 690

General Steps for a Self-signed Certificate.............................................................................................. 690
General Steps for a Public or Private CA Certificate................................................................................ 690

Chapter 31: Encryption Keys ..................................................................................................................... 693
Basic Overview............................................................................................................................................... 694

Encryption Key Length ............................................................................................................................. 695
Encryption Key Guidelines ....................................................................................................................... 695
SSL and Enhanced Stacking ................................................................................................................... 695

Technical Overview of Secure Sockets Layer ................................................................................................ 697

SSL Encryption ........................................................................................................................................ 697
User Verification....................................................................................................................................... 698
Authentication .......................................................................................................................................... 698

Technical Overview of Encryption .................................................................................................................. 700

Data Encryption........................................................................................................................................ 700
Data Authentication.................................................................................................................................. 702
Key Exchange Algorithms ........................................................................................................................ 703

Creating an Encryption Key............................................................................................................................ 705
Deleting an Encryption Key ............................................................................................................................ 709
Modifying an Encryption Key .......................................................................................................................... 710
Exporting an Encryption Key .......................................................................................................................... 711
Importing an Encryption Key .......................................................................................................................... 714
Displaying the Encryption Keys ...................................................................................................................... 717

Chapter 32: PKI Certificates and SSL ........................................................................................................ 719
Basic Overview............................................................................................................................................... 720

Types of Certificates ................................................................................................................................ 720
Distinguished Names ............................................................................................................................... 721
Guidelines ................................................................................................................................................ 723

Technical Overview ........................................................................................................................................ 724

Public Keys .............................................................................................................................................. 724
Message Encryption................................................................................................................................. 724
Digital Signatures ..................................................................................................................................... 724
Certificates ............................................................................................................................................... 725
Elements of a Public Key Infrastructure ................................................................................................... 726
Certificate Validation ................................................................................................................................ 727
Certificate Revocation Lists (CRLs) ......................................................................................................... 727
PKI Implementation.................................................................................................................................. 727

Creating a Self-signed Certificate................................................................................................................... 729
Adding a Certificate to the Database.............................................................................................................. 733
Modifying a Certificate .................................................................................................................................... 736
Deleting a Certificate ...................................................................................................................................... 739
Viewing a Certificate....................................................................................................................................... 741
Generating an Enrollment Request ................................................................................................................ 744
Installing CA Certificates onto a Switch.......................................................................................................... 747

Advertising