Allied Telesis AT-S62 User Manual
Page 10

Table of Contents
10
Data Authentication ............................................................................................................................................................................... 497
Key Exchange Algorithms ..................................................................................................................................................................... 498
Creating an Encryption Key ...........................................................................................................................................................................500
Deleting an Encryption Key ...........................................................................................................................................................................504
Modifying an Encryption Key ........................................................................................................................................................................505
Exporting an Encryption Key .........................................................................................................................................................................506
Importing an Encryption Key ........................................................................................................................................................................508
Public Key Infrastructure Certificates ...................................................................................................................................................510
Basic Overview ...................................................................................................................................................................................................511
Types of Certificates ................................................................................................................................................................................ 511
Distinguished Names ............................................................................................................................................................................. 512
SSL and Enhanced Stacking ................................................................................................................................................................. 514
Guidelines ................................................................................................................................................................................................... 515
SSL Encryption .......................................................................................................................................................................................... 516
User Verification ....................................................................................................................................................................................... 517
Authentication .......................................................................................................................................................................................... 518
Public Key Infrastructure ....................................................................................................................................................................... 518
Public Keys ................................................................................................................................................................................................. 518
Message Encryption ................................................................................................................................................................................ 518
Digital Signatures .................................................................................................................................................................................... 519
Certificates .................................................................................................................................................................................................. 519
Elements of a Public Key Infrastructure ........................................................................................................................................... 520
Certificate Validation .............................................................................................................................................................................. 521
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 522
PKI Implementation ................................................................................................................................................................................ 522
Creating a Self-signed Certificate ................................................................................................................................................................524
Adding a Certificate to the Database .........................................................................................................................................................528
Modifying a Certificate ....................................................................................................................................................................................531
Deleting a Certificate .......................................................................................................................................................................................533
Viewing a Certificate ........................................................................................................................................................................................534
Generating an Enrollment Request ............................................................................................................................................................537
Installing CA Certificates onto a Switch ....................................................................................................................................................540
Configuring PKI ..................................................................................................................................................................................................541
Configuring SSL ..................................................................................................................................................................................................542
Secure Shell (SSH) Protocol ........................................................................................................................................................................543
SSH Overview ......................................................................................................................................................................................................544
Support for SSH ........................................................................................................................................................................................ 544
SSH Server .................................................................................................................................................................................................. 545
SSH Clients ................................................................................................................................................................................................. 545
SSH and Enhanced Stacking ................................................................................................................................................................ 546
Guidelines ................................................................................................................................................................................................... 547
General Steps to Configuring SSH ..................................................................................................................................................... 547
Configuring the SSH Server ...........................................................................................................................................................................548
Displaying SSH Information ...........................................................................................................................................................................550
RADIUS and TACACS+ Authentication Protocols ............................................................................................................................552
TACACS+ and RADIUS Overview .................................................................................................................................................................553