H3c-technologies H3C WX6000 Series Access Controllers Manual de usuario Pagina 27

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 678
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 26
xxii
Displaying Help Information ··········································································································65-4
Terminating the Connection to the Remote SFTP Server·····························································65-5
SFTP Configuration Example ···············································································································65-5
66 SSL Configuration ·································································································································66-1
SSL Overview ·······································································································································66-1
SSL Configuration Task List ·················································································································66-2
Configuring an SSL Server Policy·········································································································66-2
Configuration Prerequisites ···········································································································66-2
Configuration Procedure················································································································66-2
SSL Server Policy Configuration Example ····················································································66-3
Configuring an SSL Client Policy ··········································································································66-5
Configuration Prerequisites ···········································································································66-5
Configuration Procedure················································································································66-5
Displaying and Maintaining SSL ···········································································································66-6
Troubleshooting SSL·····························································································································66-6
SSL Handshake Failure·················································································································66-6
67 HTTPS Configuration ····························································································································67-1
HTTPS Overview ··································································································································67-1
HTTPS Configuration Task List ············································································································67-1
Associating the HTTPS Service with an SSL Server Policy ·································································67-1
Enabling the HTTPS Service ················································································································67-2
Associating the HTTPS Service with a Certificate Attribute Access Control Policy······························67-3
Associating the HTTPS Service with an ACL ·······················································································67-3
Displaying and Maintaining HTTPS ······································································································67-4
HTTPS Configuration Example·············································································································67-4
68 PKI Configuration ··································································································································68-1
Introduction to PKI·································································································································68-1
PKI Overview·································································································································68-1
PKI Terms······································································································································68-1
Architecture of PKI·························································································································68-2
Applications of PKI ························································································································68-3
Operation of PKI ····························································································································68-3
PKI Configuration Task List ··················································································································68-4
Configuring an Entity DN ······················································································································68-4
Configuring a PKI Domain ····················································································································68-5
Submitting a PKI Certificate Request····································································································68-7
Submitting a Certificate Request in Auto Mode ············································································68-7
Submitting a Certificate Request in Manual Mode ········································································68-7
Retrieving a Certificate Manually ··········································································································68-9
Configuring PKI Certificate Validation···································································································68-9
Destroying a Local RSA Key Pair ·······································································································68-10
Deleting a Certificate···························································································································68-11
Configuring an Access Control Policy·································································································68-11
Displaying and Maintaining PKI ··········································································································68-12
PKI Configuration Examples ···············································································································68-12
Vista de pagina 26
1 2 ... 22 23 24 25 26 27 28 29 30 31 32 ... 677 678

Comentarios a estos manuales

Sin comentarios