v
Establishing a Connection to the SFTP Server···············································································9-2
Working with the SFTP Directories ·································································································9-3
Working with SFTP Files ·················································································································9-4
Displaying Help Information ············································································································9-4
Terminating the Connection to the Remote SFTP Server·······························································9-5
SFTP Client Configuration Example ·······································································································9-5
SFTP Server Configuration Example······································································································9-9
10 PKI Configuration··································································································································10-1
Introduction to PKI·································································································································10-1
PKI Overview·································································································································10-1
PKI Terms······································································································································10-1
Architecture of PKI·························································································································10-2
Applications of PKI ························································································································10-3
Operation of PKI ····························································································································10-3
PKI Configuration Task List ··················································································································10-4
Configuring an Entity DN ······················································································································10-4
Configuring a PKI Domain ····················································································································10-6
Submitting a PKI Certificate Request····································································································10-7
Submitting a Certificate Request in Auto Mode ············································································10-8
Submitting a Certificate Request in Manual Mode ········································································10-8
Retrieving a Certificate Manually ··········································································································10-9
Configuring PKI Certificate Verification·······························································································10-10
Destroying a Local RSA Key Pair ·······································································································10-11
Deleting a Certificate···························································································································10-11
Configuring an Access Control Policy·································································································10-12
Displaying and Maintaining PKI ··········································································································10-12
PKI Configuration Examples ···············································································································10-13
Requesting a Certificate from a CA Running RSA Keon ····························································10-13
Requesting a Certificate from a CA Running Windows 2003 Server··········································10-16
Configuring a Certificate Attribute-Based Access Control Policy················································10-20
Troubleshooting PKI····························································································································10-21
Failed to Retrieve a CA Certificate ······························································································10-21
Failed to Request a Local Certificate ··························································································10-22
Failed to Retrieve CRLs ··············································································································10-22
11 SSL Configuration·································································································································11-1
SSL Overview ·······································································································································11-1
SSL Security Mechanism ··············································································································11-1
SSL Protocol Stack························································································································11-2
SSL Configuration Task List ·················································································································11-2
Configuring an SSL Server Policy·········································································································11-3
Configuration Prerequisites ···········································································································11-3
Configuration Procedure················································································································11-3
SSL Server Policy Configuration Example····················································································11-4
Configuring an SSL Client Policy ··········································································································11-5
Configuration Prerequisites ···········································································································11-6
Configuration Procedure················································································································11-6
Displaying and Maintaining SSL ···········································································································11-6