H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 27

xxii
Displaying Help Information ··········································································································65-4
Terminating the Connection to the Remote SFTP Server·····························································65-5
SFTP Configuration Example ···············································································································65-5
66 SSL Configuration ·································································································································66-1
SSL Overview ·······································································································································66-1
SSL Configuration Task List ·················································································································66-2
Configuring an SSL Server Policy·········································································································66-2
Configuration Prerequisites ···········································································································66-2
Configuration Procedure················································································································66-2
SSL Server Policy Configuration Example ····················································································66-3
Configuring an SSL Client Policy ··········································································································66-5
Configuration Prerequisites ···········································································································66-5
Configuration Procedure················································································································66-5
Displaying and Maintaining SSL ···········································································································66-6
Troubleshooting SSL·····························································································································66-6
SSL Handshake Failure·················································································································66-6
67 HTTPS Configuration ····························································································································67-1
HTTPS Overview ··································································································································67-1
HTTPS Configuration Task List ············································································································67-1
Associating the HTTPS Service with an SSL Server Policy ·································································67-1
Enabling the HTTPS Service ················································································································67-2
Associating the HTTPS Service with a Certificate Attribute Access Control Policy······························67-3
Associating the HTTPS Service with an ACL ·······················································································67-3
Displaying and Maintaining HTTPS ······································································································67-4
HTTPS Configuration Example·············································································································67-4
68 PKI Configuration ··································································································································68-1
Introduction to PKI·································································································································68-1
PKI Overview·································································································································68-1
PKI Terms······································································································································68-1
Architecture of PKI·························································································································68-2
Applications of PKI ························································································································68-3
Operation of PKI ····························································································································68-3
PKI Configuration Task List ··················································································································68-4
Configuring an Entity DN ······················································································································68-4
Configuring a PKI Domain ····················································································································68-5
Submitting a PKI Certificate Request····································································································68-7
Retrieving a Certificate Manually ··········································································································68-9
Configuring PKI Certificate Validation···································································································68-9
Destroying a Local RSA Key Pair ·······································································································68-10
Deleting a Certificate···························································································································68-11
Configuring an Access Control Policy·································································································68-11
Displaying and Maintaining PKI ··········································································································68-12
PKI Configuration Examples ···············································································································68-12