beautypg.com

Section v, Security features 468 – Allied Telesis AT-S60 User Manual

Page 9

background image

AT-S60 Management Software User’s Guide

9

Section V
Security Features

..................................................................................................................................................................... 468

Chapter 21

Port Security ...................................................................................................................................................................................................... 469
Port Security Overview .................................................................................................................................................................................... 470

Automatic ................................................................................................................................................................................................... 470
Limited ........................................................................................................................................................................................................ 470
Secured ....................................................................................................................................................................................................... 471
Locked ......................................................................................................................................................................................................... 471
Security Violations and Intrusion Actions ....................................................................................................................................... 472

Configuring Port Security ............................................................................................................................................................................... 473

Chapter 22

Web Server ......................................................................................................................................................................................................... 477
Web Server Overview ...................................................................................................................................................................................... 478

Protocols Supported .............................................................................................................................................................................. 478

Configuring the Web Server for Security Features ............................................................................................................................... 479
Configuring SSL Certificates .......................................................................................................................................................................... 481

Configuring Self-Signed Certificates ................................................................................................................................................ 481
Configuring CA Certificates ................................................................................................................................................................. 482

Chapter 23

Encryption .......................................................................................................................................................................................................... 484
Encryption Overview ....................................................................................................................................................................................... 485
Data Encryption ................................................................................................................................................................................................. 486

Symmetrical Encryption ........................................................................................................................................................................ 486
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 487

Data Authentication ......................................................................................................................................................................................... 489
Key Exchange Algorithms .............................................................................................................................................................................. 490
Configuring Keys for Encryption ................................................................................................................................................................. 491

Configuring a Distinguished Name and Keys ............................................................................................................................... 491
Modifying and Deleting Keys .............................................................................................................................................................. 495
Exporting Keys .......................................................................................................................................................................................... 497
Importing Keys ......................................................................................................................................................................................... 498

Chapter 24

Public Key Infrastructure (PKI) ................................................................................................................................................................. 501
Public Key Infrastructure Overview ............................................................................................................................................................ 502

Public Keys ................................................................................................................................................................................................. 502
Message Encryption ............................................................................................................................................................................... 503
Digital Signatures .................................................................................................................................................................................... 503
Certificates ................................................................................................................................................................................................. 503
Elements of a Public Key Infrastructure ........................................................................................................................................... 504
Certificate Validation .............................................................................................................................................................................. 505
Certificate Revocation Lists (CRLs) .................................................................................................................................................... 506

PKI Implementation ......................................................................................................................................................................................... 507

PKI Standards ............................................................................................................................................................................................ 507
Certificate Retrieval and Storage ....................................................................................................................................................... 507

Configuring Certificates .................................................................................................................................................................................. 508

Creating Certificates ............................................................................................................................................................................... 508
Adding Certificates to the Database ................................................................................................................................................ 513
Deleting and Modifying Certificates ................................................................................................................................................ 515
Viewing Certificates ................................................................................................................................................................................ 518

Generating Enrollment Requests ................................................................................................................................................................ 521