Operation; Configuration Task List - HP A6600 Configuration Manual

Hide thumbs Also See for A6600:
Table of Contents

Advertisement

VPN
VPN is a private data communication network built on the public communication infrastructure. A VPN
can leverage network layer security protocols (for instance, IPsec) in conjunction with PKI-based
encryption and digital signature technologies for confidentiality.
Secure email
Emails require confidentiality, integrity, authentication, and non-repudiation. PKI can address these
needs. The secure email protocol that is developing rapidly is S/MIME, which is based on PKI and
allows for transfer of encrypted mails with signature.
Web security
For web security, two peers can establish an SSL connection first for transparent and secure
communications at the application layer. With PKI, SSL enables encrypted communications between a
browser and a server. Both of the communication parties can verify each other's identity through digital
certificates.

Operation

In a PKI-enabled network, an entity can request a local certificate from the CA, and the router can check
the validity of certificates. Here is how it works:
An entity submits a certificate request to the RA.
1.
The RA reviews the identity of the entity and then sends the identity information and the public key
2.
with a digital signature to the CA.
The CA verifies the digital signature, approves the application, and issues a certificate.
3.
The RA receives the certificate from the CA, sends it to the LDAP server to provide directory
4.
navigation service, and notifies the entity that the certificate is successfully issued.
The entity retrieves the certificate. With the certificate, the entity can communicate with other entities
5.
safely through encryption and digital signature.
The entity makes a request to the CA when it needs to revoke its certificate. The CA approves the
6.
request, updates the CRLs, and publishes the CRLs on the LDAP server.

Configuration task list

Task
Configuring an entity DN
Configuring a PKI domain
Submitting a PKI certificate request
Retrieving a certificate manually
Configuring PKI certificate verification
Destroying a local RSA or DSA key pair
Deleting a certificate
Submitting a certificate request
in auto mode
Submitting a certificate request
in manual mode
221
Remarks
Required
Required
Required
Use either approach
Optional
Optional
Optional
Optional

Advertisement

Table of Contents
loading

Table of Contents