beautypg.com

H3C Technologies H3C S3600 Series Switches User Manual

Page 1165

background image

i

Table of Contents

1 PKI Configuration ······································································································································1-1

Introduction to PKI···································································································································1-1

PKI Overview···································································································································1-1

PKI Terms········································································································································1-1

Architecture of PKI···························································································································1-2

Applications of PKI ··························································································································1-3

Operation of PKI ······························································································································1-3

PKI Configuration Task List ····················································································································1-4

Configuring an Entity DN ························································································································1-4

Configuring a PKI Domain ······················································································································1-6

Submitting a PKI Certificate Request······································································································1-7

Submitting a Certificate Request in Auto Mode ··············································································1-7

Submitting a Certificate Request in Manual Mode ··········································································1-8

Retrieving a Certificate Manually ············································································································1-9

Configuring PKI Certificate Verification·································································································1-10

Destroying a Local RSA Key Pair ·········································································································1-11

Deleting a Certificate·····························································································································1-11

Configuring an Access Control Policy···································································································1-12

Displaying and Maintaining PKI ············································································································1-12

PKI Configuration Examples ·················································································································1-13

Requesting a Certificate from a CA Running RSA Keon ······························································1-13

Requesting a Certificate from a CA Running Windows 2003 Server············································1-16

Troubleshooting PKI······························································································································1-19

Failed to Retrieve a CA Certificate ································································································1-19

Failed to Request a Local Certificate ····························································································1-20

Failed to Retrieve CRLs ················································································································1-20

This manual is related to the following products: