EasyManuals Logo

HP V1910 Switch Series User Manual

HP V1910 Switch Series
470 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #389 background imageLoading...
Page #389 background image
375
Figure 347 PKI architecture
Entity
An entity is an end user of PKI products or services, such as a person, an organization, a device like a
router or a switch, or a process running on a computer.
CA
A certificate authority (CA) is a trusted authority responsible for issuing and managing digital certificates.
A CA issues certificates, specifies the validity periods of certificates, and revokes certificates as needed
by publishing CRLs.
RA
A registration authority (RA) is an extended part of a CA or an independent authority. An RA can
implement functions including identity authentication, CRL management, key pair generation and key
pair backup. It only examines the qualifications of users; it does not sign certificates. Sometimes, a CA
assumes the registration management responsibility and no independent RA exists. The PKI standard
recommends that an independent RA be used for registration management to achieve higher security of
application systems.
PKI repository
A PKI repository can be a Lightweight Directory Access Protocol (LDAP) server or a common database.
It stores and manages information like certificate requests, certificates, keys, CRLs and logs, and it
provides a simple query function.
LDAP is a protocol for accessing and managing PKI information. An LDAP server stores user information
and digital certificates from the RA server and provides directory navigation service. From an LDAP server,
an entity can retrieve digital certificates of its own and other entities.
Applications of PKI
The PKI technology can satisfy the security requirements of online transactions. As an infrastructure, PKI
has a wide range of applications. Here are some application examples.
VPN
A virtual private network (VPN) is a private data communication network built on the public
communication infrastructure. A VPN can leverage network layer security protocols (for instance, IPSec)
in conjunction with PKI-based encryption and digital signature technologies to achieve confidentiality.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP V1910 Switch Series and is the answer not in the manual?

HP V1910 Switch Series Specifications

General IconGeneral
Product SeriesV1910
VLAN SupportYes
QoSYes
Ports8, 24, or 48 10/100/1000 ports
MAC Address Table Size8K entries
Power SupplyInternal power supply
Jumbo Frame SupportYes
Operating Humidity10% to 90% (non-condensing)

Related product manuals