beautypg.com

Allied Telesis AT-S62 User Manual

Page 10

background image

Table of Contents

10

Data Authentication ............................................................................................................................................................................... 497
Key Exchange Algorithms ..................................................................................................................................................................... 498

Creating an Encryption Key ...........................................................................................................................................................................500
Deleting an Encryption Key ...........................................................................................................................................................................504
Modifying an Encryption Key ........................................................................................................................................................................505
Exporting an Encryption Key .........................................................................................................................................................................506
Importing an Encryption Key ........................................................................................................................................................................508

Chapter 27

Public Key Infrastructure Certificates ...................................................................................................................................................510
Basic Overview ...................................................................................................................................................................................................511

Types of Certificates ................................................................................................................................................................................ 511
Distinguished Names ............................................................................................................................................................................. 512
SSL and Enhanced Stacking ................................................................................................................................................................. 514
Guidelines ................................................................................................................................................................................................... 515

Technical Overview ...........................................................................................................................................................................................516

SSL Encryption .......................................................................................................................................................................................... 516
User Verification ....................................................................................................................................................................................... 517
Authentication .......................................................................................................................................................................................... 518
Public Key Infrastructure ....................................................................................................................................................................... 518
Public Keys ................................................................................................................................................................................................. 518
Message Encryption ................................................................................................................................................................................ 518
Digital Signatures .................................................................................................................................................................................... 519
Certificates .................................................................................................................................................................................................. 519
Elements of a Public Key Infrastructure ........................................................................................................................................... 520
Certificate Validation .............................................................................................................................................................................. 521
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 522
PKI Implementation ................................................................................................................................................................................ 522

Creating a Self-signed Certificate ................................................................................................................................................................524
Adding a Certificate to the Database .........................................................................................................................................................528
Modifying a Certificate ....................................................................................................................................................................................531
Deleting a Certificate .......................................................................................................................................................................................533
Viewing a Certificate ........................................................................................................................................................................................534
Generating an Enrollment Request ............................................................................................................................................................537
Installing CA Certificates onto a Switch ....................................................................................................................................................540
Configuring PKI ..................................................................................................................................................................................................541
Configuring SSL ..................................................................................................................................................................................................542

Chapter 28

Secure Shell (SSH) Protocol ........................................................................................................................................................................543
SSH Overview ......................................................................................................................................................................................................544

Support for SSH ........................................................................................................................................................................................ 544
SSH Server .................................................................................................................................................................................................. 545
SSH Clients ................................................................................................................................................................................................. 545
SSH and Enhanced Stacking ................................................................................................................................................................ 546
Guidelines ................................................................................................................................................................................................... 547
General Steps to Configuring SSH ..................................................................................................................................................... 547

Configuring the SSH Server ...........................................................................................................................................................................548
Displaying SSH Information ...........................................................................................................................................................................550

Chapter 29

RADIUS and TACACS+ Authentication Protocols ............................................................................................................................552
TACACS+ and RADIUS Overview .................................................................................................................................................................553

Guidelines ................................................................................................................................................................................................... 554

Configuring Authentication Protocol Settings .......................................................................................................................................557

Displaying RADIUS Status and Settings ........................................................................................................................................... 562