EasyManuals Logo

HP V1910 User Manual

HP V1910
483 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #397 background imageLoading...
Page #397 background image
385
Secure email
Emails require confidentiality, integrity, authentication, and non-repudiation. PKI can address these needs.
The secure e-mail protocol that is developing rapidly is Secure/Multipurpose Internet Mail Extensions
(S/MIME), which is based on PKI and allows for transfer of encrypted mails with signature.
Web security
For Web security, two peers can establish a Secure Sockets Layer (SSL) connection first for transparent and
secure communications at the application layer. With PKI, SSL enables encrypted communications between
a browser and a server. Both the communication parties can verify the identity of each other through digital
certificates.
Operation of PKI
In a PKI-enabled network, an entity can request a local certificate from the CA and the device can check the
validity of certificate. The following describes how it works:
Table 139 An entity submits a certificate request to the CA.
Table 140 The RA verifies the identity of the entity and then sends the identity information and the public key
with a digital signature to the CA.
Table 141 The CA verifies the digital signature, approves the application, and issues a certificate.
Table 142 The RA receives the certificate from the CA, sends it to the LDAP server to provide directory
navigation service, and notifies the entity that the certificate is successfully issued.
Table 143 The entity retrieves the certificate. With the certificate, the entity can communicate with other
entities safely through encryption and digital signature.
Table 144 The entity makes a request to the CA when it needs to revoke its certificate. The CA approves the
request, updates the CRLs and publishes the CRLs on the LDAP server.
Configuring PKI
Configuration task list
The device supports the following PKI certificate request modes:
Manual—In manual mode, you need to retrieve a CA certificate, generate a local RSA key pair, and
submit a local certificate request for an entity.
Auto—In auto mode, an entity automatically requests a certificate through the Simple Certification
Enrollment Protocol (SCEP) when it has no local certificate or the present certificate is about to expire.
You can specify the PKI certificate request mode for a PKI domain. Different PKI certificate request modes
require different configurations:
Requesting a certificate manually
Perform the tasks in 1 to request a certificate manually.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP V1910 and is the answer not in the manual?

HP V1910 Specifications

General IconGeneral
Switching Capacity56 Gbps
Forwarding Rate41.7 Mpps
ManageableYes
Form FactorRack-mountable
FeaturesVLAN, QoS, Link Aggregation
Operating Temperature0°C to 45°C
Operating Humidity10% to 90% (non-condensing)
Ports24 x 10/100/1000 + 4 x SFP

Related product manuals