beautypg.com

H3C Technologies H3C WX3000E Series Wireless Switches User Manual

Page 11

background image

v

Setting global password control parameters ···································································································· 253

 

Setting user group password control parameters ···························································································· 254

 

Setting local user password control parameters ······························································································ 254

 

Setting super password control parameters ····································································································· 255

 

Setting a local user password in interactive mode ·························································································· 255

 

Displaying and maintaining password control ········································································································· 256

 

Password control configuration example ·················································································································· 256

 

Managing public keys ············································································································································ 259

 

Asymmetric key algorithm overview ·························································································································· 259

 

Basic concepts ····················································································································································· 259

 

Key algorithm types ············································································································································· 259

 

Asymmetric key algorithm applications ············································································································ 259

 

Configuring the local asymmetric key pair ··············································································································· 260

 

Creating an asymmetric key pair ······················································································································ 260

 

Displaying or exporting the local RSA host public key ··················································································· 260

 

Destroying an asymmetric key pair ··················································································································· 261

 

Configuring a peer public key ···································································································································· 261

 

Displaying and maintaining public keys ··················································································································· 262

 

Public key configuration examples ····························································································································· 262

 

Configuring a peer public key manually ·········································································································· 262

 

Importing a peer public key from a public key file ·························································································· 264

 

Configuring PKI ······················································································································································· 267

 

Overview ······································································································································································· 267

 

PKI terms ······························································································································································· 267

 

PKI architecture ···················································································································································· 268

 

PKI applications ··················································································································································· 269

 

How does PKI work ············································································································································· 269

 

PKI configuration task list ············································································································································ 269

 

Configuring an entity DN ············································································································································ 270

 

Configuring a PKI domain ··········································································································································· 271

 

Submitting a PKI certificate request ···························································································································· 273

 

Submitting a certificate request in auto mode ·································································································· 273

 

Submitting a certificate request in manual mode ····························································································· 273

 

Retrieving a certificate manually ································································································································ 274

 

Configuring PKI certificate verification ······················································································································ 275

 

Configuring CRL-checking-enabled PKI certificate verification ······································································· 275

 

Configuring CRL-checking-disabled PKI certificate verification ······································································ 276

 

Destroying a local RSA key pair ································································································································ 276

 

Deleting a certificate ···················································································································································· 277

 

Configuring an access control policy ························································································································ 277

 

Displaying and maintaining PKI ································································································································· 277

 

PKI configuration examples ········································································································································· 278

 

Requesting a certificate from a CA running RSA Keon ··················································································· 278

 

Requesting a certificate from a CA running Windows 2003 Server ···························································· 281

 

Configuring a certificate attribute-based access control policy ······································································ 284

 

Troubleshooting PKI ····················································································································································· 286

 

Failed to retrieve a CA certificate ······················································································································ 286

 

Failed to request a local certificate ··················································································································· 286

 

Failed to retrieve CRLs ········································································································································ 287

 

Configuring SSH2.0 ··············································································································································· 288

 

Overview ······································································································································································· 288

 

How does SSH work ··········································································································································· 288

 

Configuring the access controller as an SSH server ································································································ 291