beautypg.com

H3C Technologies H3C SecPath F1000-E User Manual

Page 774

background image

i

Table of Contents

PKI Configuration ························································································································································· 1

PKI Overview ·····································································································································································1

PKI Terms···································································································································································1

Architecture of PKI····················································································································································2

Applications of PKI···················································································································································3

Operation of PKI·······················································································································································3

Configuring PKI ·································································································································································4

Configuration Task List·············································································································································4

Creating a PKI Entity ················································································································································6

Creating a PKI Domain············································································································································7

Generating an RSA Key Pair································································································································ 10

Destroying the RSA Key Pair ································································································································ 10

Retrieving and Displaying a Certificate ·············································································································· 11

Requesting a Local Certificate······························································································································ 12

Retrieving and Displaying a CRL ························································································································· 13

PKI Configuration Examples·········································································································································· 14

Configuring a PKI Entity to Request a Certificate from a CA (Method I)························································· 14

Configuring a PKI Entity to Request a Certificate from a CA (Method II)························································ 21

Applying RSA Digital Signature in IKE Negotiation·························································································· 25

Configuration Guidelines ·············································································································································· 33

This manual is related to the following products: