Allied Telesis AT-S63 User Manual
Page 12

Contents
12
Configuring Authenticator Port Parameters ....................................................................................................739
Configuring Supplicant Port Parameters.........................................................................................................745
Displaying the Port Access Parameters..........................................................................................................748
Configuring RADIUS Accounting ....................................................................................................................750
Chapter 32: Web Server ..............................................................................................................................755
Web Server Overview .....................................................................................................................................756
Configuring the Web Server............................................................................................................................757
General Steps for Configuring the Web Server for Encryption .......................................................................760
Chapter 33: Encryption Keys ......................................................................................................................763
Basic Overview ...............................................................................................................................................764
Data Encryption ........................................................................................................................................766
Data Authentication ..................................................................................................................................768
Key Exchange Algorithms ........................................................................................................................769
Creating an Encryption Key ............................................................................................................................771
Deleting an Encryption Key.............................................................................................................................775
Modifying an Encryption Key ..........................................................................................................................776
Exporting an Encryption Key...........................................................................................................................777
Importing an Encryption Key...........................................................................................................................780
Displaying the Encryption Keys ......................................................................................................................783
Chapter 34: PKI Certificates and SSL ........................................................................................................785
Basic Overview ...............................................................................................................................................786
Types of Certificates.................................................................................................................................786
Distinguished Names................................................................................................................................787
SSL and Enhanced Stacking....................................................................................................................788
Guidelines.................................................................................................................................................789
SSL Encryption.........................................................................................................................................790
User Verification .......................................................................................................................................791
Authentication...........................................................................................................................................792
Public Key Infrastructure ..........................................................................................................................792
Public Keys...............................................................................................................................................792
Message Encryption .................................................................................................................................792
Digital Signatures .....................................................................................................................................792
Certificates................................................................................................................................................793
Elements of a Public Key Infrastructure ...................................................................................................794
Certificate Validation.................................................................................................................................795
Certificate Revocation Lists (CRLs)..........................................................................................................795
PKI Implementation ..................................................................................................................................796
Creating a Self-signed Certificate ...................................................................................................................797
Adding a Certificate to the Database ..............................................................................................................801
Modifying a Certificate ....................................................................................................................................804
Deleting a Certificate.......................................................................................................................................807
Viewing a Certificate .......................................................................................................................................809
Generating an Enrollment Request.................................................................................................................812
Installing CA Certificates onto a Switch ..........................................................................................................815