Allied Telesis AT-S63 User Manual
Page 11

AT-S63 Management Software Menus Interface User’s Guide
11
Configuring the Web Server ..........................................................................................................................................................................542
General Steps for Configuring the Web Server for Encryption .........................................................................................................545
Chapter 26
Encryption Keys ...............................................................................................................................................................................................547
Basic Overview ...................................................................................................................................................................................................548
SSL Encryption .......................................................................................................................................................................................... 551
User Verification ....................................................................................................................................................................................... 552
Authentication .......................................................................................................................................................................................... 553
Symmetrical Encryption ................................................................................................................................................................554
DES Encryption Algorithms ..........................................................................................................................................................554
Triple DES Encryption Algorithms ..............................................................................................................................................555
Asymmetrical (Public Key) Encryption .....................................................................................................................................556
Data Authentication ............................................................................................................................................................................... 556
Key Exchange Algorithms ..................................................................................................................................................................... 557
Creating an Encryption Key ...........................................................................................................................................................................559
Deleting an Encryption Key ...........................................................................................................................................................................563
Modifying an Encryption Key ........................................................................................................................................................................564
Exporting an Encryption Key .........................................................................................................................................................................565
Importing an Encryption Key ........................................................................................................................................................................568
Displaying the Encryption Keys ....................................................................................................................................................................571
Chapter 27
PKI Certificates and SSL ...............................................................................................................................................................................573
Basic Overview ...................................................................................................................................................................................................575
Types of Certificates ................................................................................................................................................................................ 575
Distinguished Names ............................................................................................................................................................................. 576
Guidelines ................................................................................................................................................................................................... 578
Public Keys ................................................................................................................................................................................................. 579
Message Encryption ............................................................................................................................................................................... 579
Digital Signatures .................................................................................................................................................................................... 579
Certificates ................................................................................................................................................................................................. 580
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 582
PKI Implementation ................................................................................................................................................................................ 583
Creating a Self-signed Certificate ................................................................................................................................................................584
Adding a Certificate to the Database .........................................................................................................................................................588
Modifying a Certificate ....................................................................................................................................................................................591