beautypg.com

Allied Telesis AT-S62 User Manual

Page 12

background image

Table of Contents

12

Section VII
Management Security

...................................................................................................................... 629

Chapter 31

Web Server .........................................................................................................................................................................................................630
Web Server Overview .......................................................................................................................................................................................631

Supported Protocols ............................................................................................................................................................................... 631
General Steps to Configuring the Web Server for Encryption ................................................................................................. 632

Configuring the Web Server ..........................................................................................................................................................................634

Chapter 32

Encryption Keys ...............................................................................................................................................................................................636
Basic Overview ...................................................................................................................................................................................................637

Encryption Key Length .......................................................................................................................................................................... 638
Encryption Key Guidelines ................................................................................................................................................................... 638

Technical Overview ...........................................................................................................................................................................................639

Data Encryption ........................................................................................................................................................................................ 639
Data Authentication ............................................................................................................................................................................... 641
Key Exchange Algorithms ..................................................................................................................................................................... 642

Creating an Encryption Key ...........................................................................................................................................................................644
Deleting an Encryption Key ...........................................................................................................................................................................648
Modifying an Encryption Key ........................................................................................................................................................................649
Exporting an Encryption Key .........................................................................................................................................................................650
Importing an Encryption Key ........................................................................................................................................................................652

Chapter 33

Public Key Infrastructure Certificates ...................................................................................................................................................654
Basic Overview ...................................................................................................................................................................................................655

Types of Certificates ................................................................................................................................................................................ 655
Distinguished Names ............................................................................................................................................................................. 656
SSL and Enhanced Stacking ................................................................................................................................................................. 658
Guidelines ................................................................................................................................................................................................... 659

Technical Overview ...........................................................................................................................................................................................660

SSL Encryption .......................................................................................................................................................................................... 660
User Verification ....................................................................................................................................................................................... 661
Authentication .......................................................................................................................................................................................... 662
Public Key Infrastructure ....................................................................................................................................................................... 662
Public Keys ................................................................................................................................................................................................. 662
Message Encryption ................................................................................................................................................................................ 662
Digital Signatures .................................................................................................................................................................................... 663
Certificates .................................................................................................................................................................................................. 663
Elements of a Public Key Infrastructure ........................................................................................................................................... 664
Certificate Validation .............................................................................................................................................................................. 665
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 666
PKI Implementation ................................................................................................................................................................................ 666

Creating a Self-signed Certificate ................................................................................................................................................................668
Adding a Certificate to the Database .........................................................................................................................................................672
Modifying a Certificate ....................................................................................................................................................................................675
Deleting a Certificate .......................................................................................................................................................................................677
Viewing a Certificate ........................................................................................................................................................................................678
Generating an Enrollment Request ............................................................................................................................................................681
Installing CA Certificates onto a Switch ....................................................................................................................................................684
Configuring PKI ..................................................................................................................................................................................................685
Configuring SSL ..................................................................................................................................................................................................686