Allied Telesis AT-S63 User Manual
Page 11

AT-S63 Management Software Menus Interface User’s Guide
11
Adding Static Unicast and Multicast MAC Addresses .................................................................................... 678
Deleting Unicast and Multicast MAC Addresses ............................................................................................ 680
Deleting All Dynamic MAC Addresses ........................................................................................................... 681
Changing the Aging Time ............................................................................................................................... 682
Chapter 30: Web Server .............................................................................................................................. 685
Web Server Overview..................................................................................................................................... 686
Configuring the Web Server ........................................................................................................................... 687
General Steps for Configuring the Web Server for Encryption....................................................................... 690
Chapter 31: Encryption Keys ..................................................................................................................... 693
Basic Overview............................................................................................................................................... 694
SSL Encryption ........................................................................................................................................ 697
User Verification....................................................................................................................................... 698
Authentication .......................................................................................................................................... 698
Data Encryption........................................................................................................................................ 700
Data Authentication.................................................................................................................................. 702
Key Exchange Algorithms ........................................................................................................................ 703
Creating an Encryption Key............................................................................................................................ 705
Deleting an Encryption Key ............................................................................................................................ 709
Modifying an Encryption Key .......................................................................................................................... 710
Exporting an Encryption Key .......................................................................................................................... 711
Importing an Encryption Key .......................................................................................................................... 714
Displaying the Encryption Keys ...................................................................................................................... 717
Chapter 32: PKI Certificates and SSL ........................................................................................................ 719
Basic Overview............................................................................................................................................... 720
Types of Certificates ................................................................................................................................ 720
Distinguished Names ............................................................................................................................... 721
Guidelines ................................................................................................................................................ 723
Public Keys .............................................................................................................................................. 724
Message Encryption................................................................................................................................. 724
Digital Signatures ..................................................................................................................................... 724
Certificates ............................................................................................................................................... 725
Elements of a Public Key Infrastructure ................................................................................................... 726
Certificate Validation ................................................................................................................................ 727
Certificate Revocation Lists (CRLs) ......................................................................................................... 727
PKI Implementation.................................................................................................................................. 727
Creating a Self-signed Certificate................................................................................................................... 729
Adding a Certificate to the Database.............................................................................................................. 733
Modifying a Certificate .................................................................................................................................... 736
Deleting a Certificate ...................................................................................................................................... 739
Viewing a Certificate....................................................................................................................................... 741
Generating an Enrollment Request ................................................................................................................ 744
Installing CA Certificates onto a Switch.......................................................................................................... 747