beautypg.com

Allied Telesis AT-S60 User Manual

Page 8

background image

Table of Contents

8

Symmetrical Encryption ........................................................................................................................................................................ 342
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 343

Data Authentication .........................................................................................................................................................................................345
Key Exchange Algorithms ..............................................................................................................................................................................346
Configuring Keys for Encryption ..................................................................................................................................................................347

Configuring a Distinguished Name and Keys ................................................................................................................................ 347
Modifying and Deleting Keys .............................................................................................................................................................. 351
Exporting Keys .......................................................................................................................................................................................... 353
Importing Keys ......................................................................................................................................................................................... 354

Chapter 21

Public Key Infrastructure (PKI) .................................................................................................................................................................357
Public Key Infrastructure Overview .............................................................................................................................................................358

Public Keys ................................................................................................................................................................................................. 358
Message Encryption ................................................................................................................................................................................ 359
Digital Signatures .................................................................................................................................................................................... 359
Certificates .................................................................................................................................................................................................. 359
Elements of a Public Key Infrastructure ........................................................................................................................................... 360
Certificate Validation .............................................................................................................................................................................. 361
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 362

PKI Implementation ..........................................................................................................................................................................................363

PKI Standards ............................................................................................................................................................................................ 363
Certificate Retrieval and Storage ....................................................................................................................................................... 363

Configuring Certificates ..................................................................................................................................................................................364

Creating Certificates ............................................................................................................................................................................... 364
Adding Certificates to the Database ................................................................................................................................................. 369
Deleting and Modifying Certificates ................................................................................................................................................. 371
Viewing Certificates ................................................................................................................................................................................ 374

Generating Enrollment Requests ................................................................................................................................................................378

Chapter 22

Secure Sockets Layer (SSL) .........................................................................................................................................................................380
Secure Sockets Layer Overview ....................................................................................................................................................................381

SSL Encryption .......................................................................................................................................................................................... 381
User Verification ....................................................................................................................................................................................... 382
Authentication .......................................................................................................................................................................................... 383
Support for SSL ......................................................................................................................................................................................... 383

Configuring SSL ..................................................................................................................................................................................................384

Chapter 23

Secure Shell (SSH) ...........................................................................................................................................................................................385
SSH Overview ......................................................................................................................................................................................................386

Support for SSH ........................................................................................................................................................................................ 386
SSH Server .................................................................................................................................................................................................. 387
SSH Clients ................................................................................................................................................................................................. 387

SSH Overall Configuration ..............................................................................................................................................................................389
Configuring SSH .................................................................................................................................................................................................390
Displaying SSH Information ...........................................................................................................................................................................393

Chapter 24

TACACS+ and RADIUS Protocols .............................................................................................................................................................395
TACACS+ and RADIUS Overview .................................................................................................................................................................396
Enabling TACACS+ or RADIUS ......................................................................................................................................................................399
Configuring TACACS+ .....................................................................................................................................................................................400
Configuring RADIUS .........................................................................................................................................................................................402