Allied-telesis AT-S62 Manuel d'utilisateur Page 12

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 760
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 11
Table of Contents
12
Section VII
Management Security
...................................................................................................................... 629
Chapter 31
Web Server .........................................................................................................................................................................................................630
Web Server Overview .......................................................................................................................................................................................631
Supported Protocols ............................................................................................................................................................................... 631
General Steps to Configuring the Web Server for Encryption ................................................................................................. 632
Configuring the Web Server ..........................................................................................................................................................................634
Chapter 32
Encryption Keys ...............................................................................................................................................................................................636
Basic Overview ...................................................................................................................................................................................................637
Encryption Key Length .......................................................................................................................................................................... 638
Encryption Key Guidelines ................................................................................................................................................................... 638
Technical Overview ...........................................................................................................................................................................................639
Data Encryption ........................................................................................................................................................................................ 639
Data Authentication ............................................................................................................................................................................... 641
Key Exchange Algorithms ..................................................................................................................................................................... 642
Creating an Encryption Key ...........................................................................................................................................................................644
Deleting an Encryption Key ...........................................................................................................................................................................648
Modifying an Encryption Key ........................................................................................................................................................................649
Exporting an Encryption Key .........................................................................................................................................................................650
Importing an Encryption Key ........................................................................................................................................................................652
Chapter 33
Public Key Infrastructure Certificates ...................................................................................................................................................654
Basic Overview ...................................................................................................................................................................................................655
Types of Certificates ................................................................................................................................................................................ 655
Distinguished Names ............................................................................................................................................................................. 656
SSL and Enhanced Stacking ................................................................................................................................................................. 658
Guidelines ................................................................................................................................................................................................... 659
Technical Overview ...........................................................................................................................................................................................660
SSL Encryption .......................................................................................................................................................................................... 660
User Verification ....................................................................................................................................................................................... 661
Authentication .......................................................................................................................................................................................... 662
Public Key Infrastructure ....................................................................................................................................................................... 662
Public Keys ................................................................................................................................................................................................. 662
Message Encryption ................................................................................................................................................................................ 662
Digital Signatures .................................................................................................................................................................................... 663
Certificates .................................................................................................................................................................................................. 663
Elements of a Public Key Infrastructure ........................................................................................................................................... 664
Certificate Validation .............................................................................................................................................................................. 665
Certificate Revocation Lists (CRLs) ..................................................................................................................................................... 666
PKI Implementation ................................................................................................................................................................................ 666
Creating a Self-signed Certificate ................................................................................................................................................................668
Adding a Certificate to the Database .........................................................................................................................................................672
Modifying a Certificate ....................................................................................................................................................................................675
Deleting a Certificate .......................................................................................................................................................................................677
Viewing a Certificate ........................................................................................................................................................................................678
Generating an Enrollment Request ............................................................................................................................................................681
Installing CA Certificates onto a Switch ....................................................................................................................................................684
Configuring PKI ..................................................................................................................................................................................................685
Configuring SSL ..................................................................................................................................................................................................686
Vue de la page 11
1 2 ... 7 8 9 10 11 12 13 14 15 16 17 ... 759 760

Commentaires sur ces manuels

Pas de commentaire