Allied Telesis AT-S62 User Manual
Page 12

Table of Contents
12
Section VII
Management Security
...................................................................................................................... 629
Web Server .........................................................................................................................................................................................................630
Web Server Overview .......................................................................................................................................................................................631
Supported Protocols ............................................................................................................................................................................... 631
General Steps to Configuring the Web Server for Encryption ................................................................................................. 632
Encryption Keys ...............................................................................................................................................................................................636
Basic Overview ...................................................................................................................................................................................................637
Data Encryption ........................................................................................................................................................................................ 639
Data Authentication ............................................................................................................................................................................... 641
Key Exchange Algorithms ..................................................................................................................................................................... 642
Creating an Encryption Key ...........................................................................................................................................................................644
Deleting an Encryption Key ...........................................................................................................................................................................648
Modifying an Encryption Key ........................................................................................................................................................................649
Exporting an Encryption Key .........................................................................................................................................................................650
Importing an Encryption Key ........................................................................................................................................................................652
Public Key Infrastructure Certificates ...................................................................................................................................................654
Basic Overview ...................................................................................................................................................................................................655
Types of Certificates ................................................................................................................................................................................ 655
Distinguished Names ............................................................................................................................................................................. 656
SSL and Enhanced Stacking ................................................................................................................................................................. 658
Guidelines ................................................................................................................................................................................................... 659
SSL Encryption .......................................................................................................................................................................................... 660
User Verification ....................................................................................................................................................................................... 661
Authentication .......................................................................................................................................................................................... 662
Public Key Infrastructure ....................................................................................................................................................................... 662
Public Keys ................................................................................................................................................................................................. 662
Message Encryption ................................................................................................................................................................................ 662
Digital Signatures .................................................................................................................................................................................... 663
Certificates .................................................................................................................................................................................................. 663
Elements of a Public Key Infrastructure ........................................................................................................................................... 664
Certificate Validation .............................................................................................................................................................................. 665
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 666
PKI Implementation ................................................................................................................................................................................ 666
Creating a Self-signed Certificate ................................................................................................................................................................668
Adding a Certificate to the Database .........................................................................................................................................................672
Modifying a Certificate ....................................................................................................................................................................................675
Deleting a Certificate .......................................................................................................................................................................................677
Viewing a Certificate ........................................................................................................................................................................................678
Generating an Enrollment Request ............................................................................................................................................................681
Installing CA Certificates onto a Switch ....................................................................................................................................................684
Configuring PKI ..................................................................................................................................................................................................685
Configuring SSL ..................................................................................................................................................................................................686