Entering a peer public key ································································································································· 113
Configuring PKI ······················································································································································· 118
Overview ······································································································································································· 118
PKI terminology ···················································································································································· 118
PKI architecture ···················································································································································· 119
PKI operation ······················································································································································· 119
PKI applications ··················································································································································· 120
PKI across VPNs ·················································································································································· 120
PKI configuration task list ············································································································································ 120
Configuring a PKI entity ·············································································································································· 121
Configuring a PKI domain ··········································································································································· 122
Requesting a certificate ··············································································································································· 124
Aborting a certificate request ····································································································································· 126
Obtaining certificates ·················································································································································· 127
Configuration prerequisites ································································································································ 127
Configuration guidelines ···································································································································· 127
Configuration procedure ···································································································································· 127
Verifying PKI certificates ·············································································································································· 128
Exporting certificates ··················································································································································· 129
Removing a certificate ················································································································································· 130
Displaying and maintaining PKI ································································································································· 132
PKI configuration examples ········································································································································· 132
Failed to obtain CRLs ·········································································································································· 149
Failed to export certificates ································································································································ 150
Failed to set the storage path ····························································································································· 151
Configuring SSH ····················································································································································· 152
Overview ······································································································································································· 152
How SSH works ··················································································································································· 152
SSH authentication methods ······························································································································· 153
iv