EasyManua.ls Logo

3Com 4210G Series - Page 498

3Com 4210G Series
1133 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
v
Establishing a Connection to the SFTP Server···············································································9-2
Working with the SFTP Directories ·································································································9-3
Working with SFTP Files ·················································································································9-4
Displaying Help Information ············································································································9-4
Terminating the Connection to the Remote SFTP Server·······························································9-5
SFTP Client Configuration Example ·······································································································9-5
SFTP Server Configuration Example······································································································9-9
10 PKI Configuration··································································································································10-1
Introduction to PKI·································································································································10-1
PKI Overview·································································································································10-1
PKI Terms······································································································································10-1
Architecture of PKI·························································································································10-2
Applications of PKI ························································································································10-3
Operation of PKI ····························································································································10-3
PKI Configuration Task List ··················································································································10-4
Configuring an Entity DN ······················································································································10-4
Configuring a PKI Domain ····················································································································10-6
Submitting a PKI Certificate Request····································································································10-7
Submitting a Certificate Request in Auto Mode ············································································10-8
Submitting a Certificate Request in Manual Mode ········································································10-8
Retrieving a Certificate Manually ··········································································································10-9
Configuring PKI Certificate Verification·······························································································10-10
Destroying a Local RSA Key Pair ·······································································································10-11
Deleting a Certificate···························································································································10-11
Configuring an Access Control Policy·································································································10-12
Displaying and Maintaining PKI ··········································································································10-12
PKI Configuration Examples ···············································································································10-13
Requesting a Certificate from a CA Running RSA Keon ····························································10-13
Requesting a Certificate from a CA Running Windows 2003 Server··········································10-16
Configuring a Certificate Attribute-Based Access Control Policy················································10-20
Troubleshooting PKI····························································································································10-21
Failed to Retrieve a CA Certificate ······························································································10-21
Failed to Request a Local Certificate ··························································································10-22
Failed to Retrieve CRLs ··············································································································10-22
11 SSL Configuration·································································································································11-1
SSL Overview ·······································································································································11-1
SSL Security Mechanism ··············································································································11-1
SSL Protocol Stack························································································································11-2
SSL Configuration Task List ·················································································································11-2
Configuring an SSL Server Policy·········································································································11-3
Configuration Prerequisites ···········································································································11-3
Configuration Procedure················································································································11-3
SSL Server Policy Configuration Example····················································································11-4
Configuring an SSL Client Policy ··········································································································11-5
Configuration Prerequisites ···········································································································11-6
Configuration Procedure················································································································11-6
Displaying and Maintaining SSL ···········································································································11-6

Table of Contents

Other manuals for 3Com 4210G Series

Related product manuals