Allied Telesis AT-S60 User Manual
Page 8

Table of Contents
8
Symmetrical Encryption ........................................................................................................................................................................ 342
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 343
Data Authentication .........................................................................................................................................................................................345
Key Exchange Algorithms ..............................................................................................................................................................................346
Configuring Keys for Encryption ..................................................................................................................................................................347
Configuring a Distinguished Name and Keys ................................................................................................................................ 347
Modifying and Deleting Keys .............................................................................................................................................................. 351
Exporting Keys .......................................................................................................................................................................................... 353
Importing Keys ......................................................................................................................................................................................... 354
Public Key Infrastructure (PKI) .................................................................................................................................................................357
Public Key Infrastructure Overview .............................................................................................................................................................358
Public Keys ................................................................................................................................................................................................. 358
Message Encryption ................................................................................................................................................................................ 359
Digital Signatures .................................................................................................................................................................................... 359
Certificates .................................................................................................................................................................................................. 359
Elements of a Public Key Infrastructure ........................................................................................................................................... 360
Certificate Validation .............................................................................................................................................................................. 361
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 362
Creating Certificates ............................................................................................................................................................................... 364
Adding Certificates to the Database ................................................................................................................................................. 369
Deleting and Modifying Certificates ................................................................................................................................................. 371
Viewing Certificates ................................................................................................................................................................................ 374
Secure Sockets Layer (SSL) .........................................................................................................................................................................380
Secure Sockets Layer Overview ....................................................................................................................................................................381
SSL Encryption .......................................................................................................................................................................................... 381
User Verification ....................................................................................................................................................................................... 382
Authentication .......................................................................................................................................................................................... 383
Support for SSL ......................................................................................................................................................................................... 383
Secure Shell (SSH) ...........................................................................................................................................................................................385
SSH Overview ......................................................................................................................................................................................................386
Support for SSH ........................................................................................................................................................................................ 386
SSH Server .................................................................................................................................................................................................. 387
SSH Clients ................................................................................................................................................................................................. 387
SSH Overall Configuration ..............................................................................................................................................................................389
Configuring SSH .................................................................................................................................................................................................390
Displaying SSH Information ...........................................................................................................................................................................393
TACACS+ and RADIUS Protocols .............................................................................................................................................................395
TACACS+ and RADIUS Overview .................................................................................................................................................................396
Enabling TACACS+ or RADIUS ......................................................................................................................................................................399
Configuring TACACS+ .....................................................................................................................................................................................400
Configuring RADIUS .........................................................................................................................................................................................402