beautypg.com

H3C Technologies H3C MSR 50 User Manual

Page 14

background image

viii

Performing basic configurations for the SSL VPN domain ························································································· 61

 

Configuring the domain policy ···························································································································· 61

 

Configuring the caching policy ··························································································································· 63

 

Configuring a bulletin ··········································································································································· 63

 

Configuring authentication policies ····························································································································· 64

 

Configuring local authentication ························································································································· 65

 

Configuring RADIUS authentication ···················································································································· 65

 

Configuring LDAP authentication ························································································································· 66

 

Configuring AD authentication ···························································································································· 68

 

Configuring combined authentication ················································································································· 69

 

Configuring a security policy ········································································································································ 70

 

Customizing the SSL VPN user interface ····················································································································· 74

 

Customizing the SSL VPN interface partially ······································································································ 75

 

Customizing the SSL VPN interface fully ············································································································· 77

 

User access to SSL VPN ············································································································································· 78

 

Logging in to the SSL VPN service interface ··············································································································· 78

 

Accessing SSL VPN resources ······································································································································· 79

 

Getting help information ··············································································································································· 80

 

Changing the login password ······································································································································ 81

 

SSL VPN configuration example ······························································································································· 82

 

Network requirements ··················································································································································· 82

 

Configuration prerequisites ··········································································································································· 82

 

Configuration procedure ··············································································································································· 83

 

Configuring the SSL VPN service ························································································································· 83

 

Configuring SSL VPN resources ··························································································································· 86

 

Configuring SSL VPN users ·································································································································· 91

 

Configuring an SSL VPN domain ························································································································ 94

 

Verifying the configuration ············································································································································ 96

 

Managing certificates ············································································································································· 100

 

Overview ······································································································································································· 100

 

Recommended configuration procedure···················································································································· 100

 

Recommended configuration procedure for manual request ·········································································· 101

 

Recommended configuration procedure for automatic request ······································································ 102

 

Creating a PKI entity ···················································································································································· 103

 

Creating a PKI domain ················································································································································ 104

 

Generating an RSA key pair······································································································································· 107

 

Destroying the RSA key pair ······································································································································· 108

 

Retrieving and displaying a certificate ······················································································································ 108

 

Requesting a local certificate ······································································································································ 110

 

Retrieving and displaying a CRL ································································································································ 111

 

PKI configuration examples ········································································································································· 111

 

Certificate request from a Windows 2003 CA server ···················································································· 111

 

Certificate request from an RSA Keon CA server ···························································································· 115

 

IKE negotiation with RSA digital signature ······································································································· 119

 

Configuration guidelines ············································································································································· 125

 

Managing the system ·············································································································································· 126

 

Configuring Web management·································································································································· 126

 

Managing the configuration ······································································································································· 126

 

Saving the configuration ····································································································································· 126

 

Restoring factory defaults ··································································································································· 127

 

Backing up configuration ··································································································································· 128

 

Restoring configuration ······································································································································· 128

 

This manual is related to the following products: