EasyManuals Logo

HP 3600 v2 Series Security Configuration Guide

HP 3600 v2 Series
398 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #7 background imageLoading...
Page #7 background image
v
User profile configuration task list ······························································································································ 222
Creating a user profile ················································································································································ 222
Configuration prerequisites ································································································································ 222
Creating a user profile ········································································································································ 223
Configuring a user profile ··········································································································································· 223
Configuration guidelines ···································································································································· 223
Configuration procedure ···································································································································· 223
Enabling a user profile ················································································································································ 224
Displaying and maintaining user profiles ·················································································································· 224
HABP configuration ················································································································································· 225
HABP overview ····························································································································································· 225
Configuring HABP ························································································································································ 226
Configuring the HABP server ····························································································································· 226
Configuring an HABP client ······························································································································· 226
Displaying and maintaining HABP ····························································································································· 227
HABP configuration example ······································································································································ 227
Public key configuration ········································································································································· 230
Overview ······································································································································································· 230
Public key configuration task list ································································································································· 230
Configuring a local asymmetric key pair on the local device ················································································· 231
Creating a local asymmetric key pair ··············································································································· 231
Displaying or exporting the local host public key ··························································································· 232
Destroying a local asymmetric key pair ············································································································ 233
Specifying the peer public key on the local device ·································································································· 233
Displaying and maintaining public keys ··················································································································· 234
Public key configuration examples ····························································································································· 235
Manually specifying the peer public key on the local device ········································································ 235
Importing a peer public key from a public key file ·························································································· 236
PKI configuration ····················································································································································· 240
Introduction to PKI ························································································································································ 240
PKI overview ························································································································································ 240
PKI terms ······························································································································································· 240
PKI architecture ···················································································································································· 241
PKI applications ··················································································································································· 242
PKI operation ······················································································································································· 242
PKI configuration task list ············································································································································ 242
Configuring an entity DN ············································································································································ 243
Configuring a PKI domain ··········································································································································· 244
Submitting a PKI certificate request ···························································································································· 246
Submitting a certificate request in auto mode ·································································································· 246
Submitting a certificate request in manual mode ····························································································· 246
Retrieving a certificate manually ································································································································ 247
Configuring PKI certificate verification ······················································································································ 248
Configuring CRL-checking-enabled PKI certificate verification ······································································· 248
Configuring CRL-checking-disabled PKI certificate verification ······································································ 249
Destroying a local RSA key pair ································································································································ 249
Deleting a certificate ···················································································································································· 250
Configuring an access control policy ························································································································ 250
Displaying and maintaining PKI ································································································································· 251
PKI configuration examples ········································································································································· 251
Requesting a certificate from a CA server running RSA Keon ······································································· 251
Requesting a certificate from a CA server running Windows 2003 Server ················································· 254
Configuring a certificate attribute-based access control policy ······································································ 257

Table of Contents

Other manuals for HP 3600 v2 Series

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP 3600 v2 Series and is the answer not in the manual?

HP 3600 v2 Series Specifications

General IconGeneral
BrandHP
Model3600 v2 Series
CategorySwitch
LanguageEnglish

Related product manuals