H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 27

Advertising
background image

xxii

Displaying Help Information ··········································································································65-4
Terminating the Connection to the Remote SFTP Server·····························································65-5

SFTP Configuration Example ···············································································································65-5

66 SSL Configuration ·································································································································66-1

SSL Overview ·······································································································································66-1
SSL Configuration Task List ·················································································································66-2
Configuring an SSL Server Policy·······························································································
··········66-2

Configuration Prerequisites ···········································································································66-2
Configuration Procedure········································································································
········66-2
SSL Server Policy Configuration Example ····················································································66-3

Configuring an SSL Client Policy ··········································································································66-5

Configuration Prerequisites ···········································································································66-5
Configuration Procedure········································································································
········66-5

Displaying and Maintaining SSL ···········································································································66-6
Troubleshooting SSL············································································································
·················66-6

SSL Handshake Failure·················································································································66-6

67 HTTPS Configuration ····························································································································67-1

HTTPS Overview ··································································································································67-1
HTTPS Configuration Task List ··································································································
··········67-1
Associating the HTTPS Service with an SSL Server Policy ·································································67-1
Enabling the HTTPS Service ················································································································67-2
Associating the HTTPS Service with a Certificate Attribute Access Control Policy······························67-3
Associating the HTTPS Service with an ACL ······················································································
·67-3
Displaying and Maintaining HTTPS ······································································································67-4
HTTPS Configuration Example····································································································
·········67-4

68 PKI Configuration ··································································································································68-1

Introduction to PKI·································································································································68-1

PKI Overview·································································································································68-1
PKI Terms······················································································································
················68-1
Architecture of PKI·························································································································68-2
Applications of PKI ························································································································68-3
Operation of PKI ···············································································································
·············68-3

PKI Configuration Task List ··················································································································68-4
Configuring an Entity DN ·······································································································
···············68-4
Configuring a PKI Domain ····················································································································68-5
Submitting a PKI Certificate Request····································································································68-7

Submitting a Certificate Request in Auto Mode ············································································68-7
Submitting a Certificate Request in Manual Mode ········································································68-7

Retrieving a Certificate Manually ··········································································································68-9
Configuring PKI Certificate Validation·························································································
··········68-9
Destroying a Local RSA Key Pair ·······································································································68-10
Deleting a Certificate···························································································································68-11
Configuring an Access Control Policy···························································································
······68-11
Displaying and Maintaining PKI ··········································································································68-12
PKI Configuration Examples ·····································································································
··········68-12

Advertising