Allied-telesis AT-S63 Manual do Utilizador Página 11

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 710
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 10
AT-S63 Management Software Menus Interface User’s Guide
11
Configuring the Web Server ..........................................................................................................................................................................542
General Steps for Configuring the Web Server for Encryption .........................................................................................................545
General Steps for a Self-signed Certificate ..................................................................................................................................... 545
General Steps for a Public or Private CA Certificate .................................................................................................................... 545
Chapter 26
Encryption Keys ...............................................................................................................................................................................................547
Basic Overview ...................................................................................................................................................................................................548
Encryption Key Length .......................................................................................................................................................................... 549
Encryption Key Guidelines ................................................................................................................................................................... 549
SSL and Enhanced Stacking ................................................................................................................................................................. 549
Technical Overview of Secure Sockets Layer ..........................................................................................................................................551
SSL Encryption .......................................................................................................................................................................................... 551
User Verification ....................................................................................................................................................................................... 552
Authentication .......................................................................................................................................................................................... 553
Technical Overview of Encryption ..............................................................................................................................................................554
Data Encryption ........................................................................................................................................................................................ 554
Symmetrical Encryption ................................................................................................................................................................554
DES Encryption Algorithms ..........................................................................................................................................................554
Triple DES Encryption Algorithms ..............................................................................................................................................555
Asymmetrical (Public Key) Encryption .....................................................................................................................................556
Data Authentication ............................................................................................................................................................................... 556
Key Exchange Algorithms ..................................................................................................................................................................... 557
Creating an Encryption Key ...........................................................................................................................................................................559
Deleting an Encryption Key ...........................................................................................................................................................................563
Modifying an Encryption Key ........................................................................................................................................................................564
Exporting an Encryption Key .........................................................................................................................................................................565
Importing an Encryption Key ........................................................................................................................................................................568
Displaying the Encryption Keys ....................................................................................................................................................................571
Chapter 27
PKI Certificates and SSL ...............................................................................................................................................................................573
Basic Overview ...................................................................................................................................................................................................575
Types of Certificates ................................................................................................................................................................................ 575
Distinguished Names ............................................................................................................................................................................. 576
Guidelines ................................................................................................................................................................................................... 578
Technical Overview ..........................................................................................................................................................................................579
Public Keys ................................................................................................................................................................................................. 579
Message Encryption ............................................................................................................................................................................... 579
Digital Signatures .................................................................................................................................................................................... 579
Certificates ................................................................................................................................................................................................. 580
X.509 Certificates ..............................................................................................................................................................................580
Elements of a Public Key Infrastructure ........................................................................................................................................... 581
End Entities (EE) ................................................................................................................................................................................581
Certification Authorities ................................................................................................................................................................581
Certificate Validation .............................................................................................................................................................................. 582
CA Hierarchies and Certificate Chains ......................................................................................................................................582
Root CA Certificates ........................................................................................................................................................................582
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 582
PKI Implementation ................................................................................................................................................................................ 583
PKI Standards .....................................................................................................................................................................................583
Certificate Retrieval and Storage ................................................................................................................................................583
Root CA Certificate Validation ................................................................................................
.....................................................583
Creating a Self-signed Certificate ................................................................................................................................................................584
Adding a Certificate to the Database .........................................................................................................................................................588
Modifying a Certificate ....................................................................................................................................................................................591
Vista de página 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 709 710

Comentários a estes Manuais

Sem comentários