H3C Technologies H3C S3600 Series Switches User Manual
Page 1165
i
Table of Contents
1 PKI Configuration ······································································································································1-1
Introduction to PKI···································································································································1-1
PKI Overview···································································································································1-1
PKI Terms········································································································································1-1
Architecture of PKI···························································································································1-2
Applications of PKI ··························································································································1-3
Operation of PKI ······························································································································1-3
PKI Configuration Task List ····················································································································1-4
Configuring an Entity DN ························································································································1-4
Configuring a PKI Domain ······················································································································1-6
Submitting a PKI Certificate Request······································································································1-7
Retrieving a Certificate Manually ············································································································1-9
Configuring PKI Certificate Verification·································································································1-10
Destroying a Local RSA Key Pair ·········································································································1-11
Deleting a Certificate·····························································································································1-11
Configuring an Access Control Policy···································································································1-12
Displaying and Maintaining PKI ············································································································1-12
PKI Configuration Examples ·················································································································1-13
Troubleshooting PKI······························································································································1-19
Failed to Retrieve a CA Certificate ································································································1-19
Failed to Request a Local Certificate ····························································································1-20
Failed to Retrieve CRLs ················································································································1-20