H3C Technologies H3C SecPath F1000-E User Manual
Page 774

i
Table of Contents
PKI Configuration ························································································································································· 1
PKI Overview ·····································································································································································1
PKI Terms···································································································································································1
Architecture of PKI····················································································································································2
Applications of PKI···················································································································································3
Operation of PKI·······················································································································································3
Configuring PKI ·································································································································································4
Configuration Task List·············································································································································4
Creating a PKI Entity ················································································································································6
Creating a PKI Domain············································································································································7
Generating an RSA Key Pair································································································································ 10
Destroying the RSA Key Pair ································································································································ 10
Retrieving and Displaying a Certificate ·············································································································· 11
Requesting a Local Certificate······························································································································ 12
Retrieving and Displaying a CRL ························································································································· 13
PKI Configuration Examples·········································································································································· 14
Applying RSA Digital Signature in IKE Negotiation·························································································· 25
Configuration Guidelines ·············································································································································· 33