EasyManua.ls Logo

HP 5120 SI Series

HP 5120 SI Series
385 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
v
FIPS compliance ··························································································································································· 197
Password control configuration task list ····················································································································· 198
Configuring password control ···································································································································· 198
Enabling password control ································································································································· 198
Setting global password control parameters ···································································································· 199
Setting user group password control parameters ···························································································· 200
Setting local user password control parameters ······························································································ 201
Setting super password control parameters ····································································································· 201
Setting a local user password in interactive mode ·························································································· 202
Displaying and maintaining password control ········································································································· 202
Password control configuration example ·················································································································· 203
HABP configuration ················································································································································· 206
Introduction to HABP ···················································································································································· 206
Configuring HABP ························································································································································ 207
Configuring the HABP server ····························································································································· 207
Configuring an HABP client ······························································································································· 207
Displaying and maintaining HABP ····························································································································· 208
HABP configuration example ······································································································································ 208
Network requirements ········································································································································· 208
Configuration procedure ···································································································································· 209
Public key configuration ········································································································································· 211
Asymmetric key algorithm overview ·························································································································· 211
Basic concepts ····················································································································································· 211
Key algorithm types ············································································································································· 211
Asymmetric key algorithm applications ············································································································ 212
FIPS compliance ··························································································································································· 212
Configuring the local asymmetric key pair ··············································································································· 212
Creating an asymmetric key pair ······················································································································ 212
Displaying or exporting the local RSA or DSA host public key······································································ 213
Destroying an asymmetric key pair ··················································································································· 213
Configuring a remote host's public key ····················································································································· 214
Displaying and maintaining public keys ··················································································································· 215
Public key configuration examples ····························································································································· 215
Configuring a remote host's public key manually ··························································································· 215
Importing a remote host's public key from a public key file ··········································································· 217
PKI configuration ····················································································································································· 220
Introduction to PKI ························································································································································ 220
PKI overview ························································································································································ 220
PKI terms ······························································································································································· 220
Architecture of PKI ··············································································································································· 221
Applications of PKI ·············································································································································· 222
Operation of PKI ·················································································································································· 222
PKI configuration task list ············································································································································ 223
Configuring an entity DN ············································································································································ 223
Configuring a PKI domain ··········································································································································· 224
Submitting a PKI certificate request ···························································································································· 226
Submitting a certificate request in auto mode ·································································································· 226
Submitting a certificate request in manual mode ····························································································· 227
Retrieving a certificate manually ································································································································ 228
Configuring PKI certificate verification ······················································································································ 228
Destroying a local RSA key pair ································································································································ 230
Deleting a certificate ···················································································································································· 230
Configuring an access control policy ························································································································ 230

Table of Contents

Other manuals for HP 5120 SI Series

Related product manuals