H3C S5120-SI Series Configuration Manual page 446

Hide thumbs Also See for S5120-SI Series:
Table of Contents

Advertisement

1 PKI Configuration ······································································································································1-1
Introduction to PKI···································································································································1-1
PKI Overview···································································································································1-1
PKI Terms········································································································································1-1
Architecture of PKI···························································································································1-2
Applications of PKI ··························································································································1-3
Operation of PKI ······························································································································1-3
PKI Configuration Task List ····················································································································1-4
Configuring an Entity DN ························································································································1-4
Configuring a PKI Domain ······················································································································1-6
Submitting a PKI Certificate Request······································································································1-7
Submitting a Certificate Request in Auto Mode ··············································································1-7
Submitting a Certificate Request in Manual Mode ··········································································1-8
Retrieving a Certificate Manually ············································································································1-9
Configuring PKI Certificate Verification·································································································1-10
Destroying a Local RSA Key Pair ·········································································································1-11
Deleting a Certificate·····························································································································1-11
Configuring an Access Control Policy···································································································1-12
Displaying and Maintaining PKI ············································································································1-12
PKI Configuration Examples ·················································································································1-13
Requesting a Certificate from a CA Running RSA Keon ······························································1-13
Requesting a Certificate from a CA Running Windows 2003 Server············································1-16
Configuring a Certificate Attribute-Based Access Control Policy··················································1-20
Troubleshooting PKI······························································································································1-21
Failed to Retrieve a CA Certificate ································································································1-21
Failed to Request a Local Certificate ····························································································1-22
Failed to Retrieve CRLs ················································································································1-22
Table of Contents
i

Advertisement

Chapters

Table of Contents
loading

Table of Contents