AT-S63 Management Software Menus Interface User’s Guide
11
Configuring the Web Server ..........................................................................................................................................................................542
General Steps for Configuring the Web Server for Encryption .........................................................................................................545
General Steps for a Self-signed Certificate ..................................................................................................................................... 545
General Steps for a Public or Private CA Certificate .................................................................................................................... 545
Chapter 26
Encryption Keys ...............................................................................................................................................................................................547
Basic Overview ...................................................................................................................................................................................................548
Encryption Key Length .......................................................................................................................................................................... 549
Encryption Key Guidelines ................................................................................................................................................................... 549
SSL and Enhanced Stacking ................................................................................................................................................................. 549
Technical Overview of Secure Sockets Layer ..........................................................................................................................................551
SSL Encryption .......................................................................................................................................................................................... 551
User Verification ....................................................................................................................................................................................... 552
Authentication .......................................................................................................................................................................................... 553
Technical Overview of Encryption ..............................................................................................................................................................554
Data Encryption ........................................................................................................................................................................................ 554
Symmetrical Encryption ................................................................................................................................................................554
DES Encryption Algorithms ..........................................................................................................................................................554
Triple DES Encryption Algorithms ..............................................................................................................................................555
Asymmetrical (Public Key) Encryption .....................................................................................................................................556
Data Authentication ............................................................................................................................................................................... 556
Key Exchange Algorithms ..................................................................................................................................................................... 557
Creating an Encryption Key ...........................................................................................................................................................................559
Deleting an Encryption Key ...........................................................................................................................................................................563
Modifying an Encryption Key ........................................................................................................................................................................564
Exporting an Encryption Key .........................................................................................................................................................................565
Importing an Encryption Key ........................................................................................................................................................................568
Displaying the Encryption Keys ....................................................................................................................................................................571
Chapter 27
PKI Certificates and SSL ...............................................................................................................................................................................573
Basic Overview ...................................................................................................................................................................................................575
Types of Certificates ................................................................................................................................................................................ 575
Distinguished Names ............................................................................................................................................................................. 576
Guidelines ................................................................................................................................................................................................... 578
Technical Overview ..........................................................................................................................................................................................579
Public Keys ................................................................................................................................................................................................. 579
Message Encryption ............................................................................................................................................................................... 579
Digital Signatures .................................................................................................................................................................................... 579
Certificates ................................................................................................................................................................................................. 580
X.509 Certificates ..............................................................................................................................................................................580
Elements of a Public Key Infrastructure ........................................................................................................................................... 581
End Entities (EE) ................................................................................................................................................................................581
Certification Authorities ................................................................................................................................................................581
Certificate Validation .............................................................................................................................................................................. 582
CA Hierarchies and Certificate Chains ......................................................................................................................................582
Root CA Certificates ........................................................................................................................................................................582
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 582
PKI Implementation ................................................................................................................................................................................ 583
PKI Standards .....................................................................................................................................................................................583
Certificate Retrieval and Storage ................................................................................................................................................583
Root CA Certificate Validation ................................................................................................
.....................................................583
Creating a Self-signed Certificate ................................................................................................................................................................584
Adding a Certificate to the Database .........................................................................................................................................................588
Modifying a Certificate ....................................................................................................................................................................................591
Comentários a estes Manuais