Allied Telesis AT-S63 User Manual

Page 11

Advertising
background image

AT-S63 Management Software Menus Interface User’s Guide

11

Configuring the Web Server ..........................................................................................................................................................................542
General Steps for Configuring the Web Server for Encryption .........................................................................................................545

General Steps for a Self-signed Certificate ..................................................................................................................................... 545
General Steps for a Public or Private CA Certificate .................................................................................................................... 545

Chapter 26
Encryption Keys
...............................................................................................................................................................................................547
Basic Overview ...................................................................................................................................................................................................548

Encryption Key Length .......................................................................................................................................................................... 549
Encryption Key Guidelines ................................................................................................................................................................... 549
SSL and Enhanced Stacking ................................................................................................................................................................. 549

Technical Overview of Secure Sockets Layer ..........................................................................................................................................551

SSL Encryption .......................................................................................................................................................................................... 551
User Verification ....................................................................................................................................................................................... 552
Authentication .......................................................................................................................................................................................... 553

Technical Overview of Encryption ..............................................................................................................................................................554

Data Encryption ........................................................................................................................................................................................ 554

Symmetrical Encryption ................................................................................................................................................................554
DES Encryption Algorithms ..........................................................................................................................................................554
Triple DES Encryption Algorithms ..............................................................................................................................................555
Asymmetrical (Public Key) Encryption .....................................................................................................................................556

Data Authentication ............................................................................................................................................................................... 556
Key Exchange Algorithms ..................................................................................................................................................................... 557

Creating an Encryption Key ...........................................................................................................................................................................559
Deleting an Encryption Key ...........................................................................................................................................................................563
Modifying an Encryption Key ........................................................................................................................................................................564
Exporting an Encryption Key .........................................................................................................................................................................565
Importing an Encryption Key ........................................................................................................................................................................568
Displaying the Encryption Keys ....................................................................................................................................................................571

Chapter 27
PKI Certificates and SSL
...............................................................................................................................................................................573
Basic Overview ...................................................................................................................................................................................................575

Types of Certificates ................................................................................................................................................................................ 575
Distinguished Names ............................................................................................................................................................................. 576
Guidelines ................................................................................................................................................................................................... 578

Technical Overview ..........................................................................................................................................................................................579

Public Keys ................................................................................................................................................................................................. 579
Message Encryption ............................................................................................................................................................................... 579
Digital Signatures .................................................................................................................................................................................... 579
Certificates ................................................................................................................................................................................................. 580

X.509 Certificates ..............................................................................................................................................................................580

Elements of a Public Key Infrastructure ........................................................................................................................................... 581

End Entities (EE) ................................................................................................................................................................................581
Certification Authorities ................................................................................................................................................................581

Certificate Validation .............................................................................................................................................................................. 582

CA Hierarchies and Certificate Chains ......................................................................................................................................582
Root CA Certificates ........................................................................................................................................................................582

Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 582
PKI Implementation ................................................................................................................................................................................ 583

PKI Standards .....................................................................................................................................................................................583
Certificate Retrieval and Storage ................................................................................................................................................583
Root CA Certificate Validation .....................................................................................................................................................583

Creating a Self-signed Certificate ................................................................................................................................................................584
Adding a Certificate to the Database .........................................................................................................................................................588
Modifying a Certificate ....................................................................................................................................................................................591

Advertising