Section v, Security features 468 – Allied Telesis AT-S60 User Manual
Page 9

AT-S60 Management Software User’s Guide
9
..................................................................................................................................................................... 468
Port Security ...................................................................................................................................................................................................... 469
Port Security Overview .................................................................................................................................................................................... 470
Automatic ................................................................................................................................................................................................... 470
Limited ........................................................................................................................................................................................................ 470
Secured ....................................................................................................................................................................................................... 471
Locked ......................................................................................................................................................................................................... 471
Security Violations and Intrusion Actions ....................................................................................................................................... 472
Web Server ......................................................................................................................................................................................................... 477
Web Server Overview ...................................................................................................................................................................................... 478
Configuring the Web Server for Security Features ............................................................................................................................... 479
Configuring SSL Certificates .......................................................................................................................................................................... 481
Configuring Self-Signed Certificates ................................................................................................................................................ 481
Configuring CA Certificates ................................................................................................................................................................. 482
Encryption .......................................................................................................................................................................................................... 484
Encryption Overview ....................................................................................................................................................................................... 485
Data Encryption ................................................................................................................................................................................................. 486
Symmetrical Encryption ........................................................................................................................................................................ 486
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 487
Data Authentication ......................................................................................................................................................................................... 489
Key Exchange Algorithms .............................................................................................................................................................................. 490
Configuring Keys for Encryption ................................................................................................................................................................. 491
Configuring a Distinguished Name and Keys ............................................................................................................................... 491
Modifying and Deleting Keys .............................................................................................................................................................. 495
Exporting Keys .......................................................................................................................................................................................... 497
Importing Keys ......................................................................................................................................................................................... 498
Public Key Infrastructure (PKI) ................................................................................................................................................................. 501
Public Key Infrastructure Overview ............................................................................................................................................................ 502
Public Keys ................................................................................................................................................................................................. 502
Message Encryption ............................................................................................................................................................................... 503
Digital Signatures .................................................................................................................................................................................... 503
Certificates ................................................................................................................................................................................................. 503
Elements of a Public Key Infrastructure ........................................................................................................................................... 504
Certificate Validation .............................................................................................................................................................................. 505
Certificate Revocation Lists (CRLs) .................................................................................................................................................... 506
Creating Certificates ............................................................................................................................................................................... 508
Adding Certificates to the Database ................................................................................................................................................ 513
Deleting and Modifying Certificates ................................................................................................................................................ 515
Viewing Certificates ................................................................................................................................................................................ 518