Key algorithm types ············································································································································ 179
Configuring a peer public key ···································································································································· 181
PKI configuration ························································································································································· 187
PKI overview ································································································································································· 187
PKI terms ······························································································································································· 187
PKI architecture ···················································································································································· 188
PKI applications ··················································································································································· 188
How does PKI work ············································································································································· 189
PKI configuration task list ············································································································································ 189
Configuring an entity DN ············································································································································ 190
Configuring a PKI domain ·········································································································································· 191
Retrieving a certificate manually ································································································································ 194
Destroying a local RSA key pair ································································································································ 196
Deleting a certificate ···················································································································································· 196
Displaying and maintaining PKI ································································································································· 197
PKI configuration examples ········································································································································· 198
Troubleshooting PKI ····················································································································································· 206
Failed to retrieve CRLs ········································································································································ 207
SSH2.0 configuration ················································································································································· 208
SSH2.0 overview ························································································································································· 208
Introduction to SSH2.0 ······································································································································· 208
How does SSH work ··········································································································································· 208
Configuring a client public key ·························································································································· 212
Configuring an SSH user ···································································································································· 213
vii