HP 3600 v2 Series Security Configuration Manual page 7

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

User profile configuration task list ······························································································································ 222
Creating a user profile ················································································································································ 222
Configuration prerequisites ································································································································ 222
Creating a user profile ········································································································································ 223
Configuring a user profile ··········································································································································· 223
Configuration guidelines ···································································································································· 223
Configuration procedure ···································································································································· 223
Enabling a user profile ················································································································································ 224
Displaying and maintaining user profiles ·················································································································· 224
HABP configuration ················································································································································· 225
HABP overview ····························································································································································· 225
Configuring HABP ························································································································································ 226
Configuring the HABP server ····························································································································· 226
Configuring an HABP client ······························································································································· 226
Displaying and maintaining HABP ····························································································································· 227
HABP configuration example ······································································································································ 227
Public key configuration ········································································································································· 230
Overview ······································································································································································· 230
Public key configuration task list ································································································································· 230
Configuring a local asymmetric key pair on the local device ················································································· 231
Creating a local asymmetric key pair ··············································································································· 231
Displaying or exporting the local host public key ··························································································· 232
Destroying a local asymmetric key pair ············································································································ 233
Specifying the peer public key on the local device ·································································································· 233
Displaying and maintaining public keys ··················································································································· 234
Public key configuration examples ····························································································································· 235
Manually specifying the peer public key on the local device ········································································ 235
Importing a peer public key from a public key file ·························································································· 236
PKI configuration ····················································································································································· 240
Introduction to PKI ························································································································································ 240
PKI overview ························································································································································ 240
PKI terms ······························································································································································· 240
PKI architecture ···················································································································································· 241
PKI applications ··················································································································································· 242
PKI operation ······················································································································································· 242
PKI configuration task list ············································································································································ 242
Configuring an entity DN ············································································································································ 243
Configuring a PKI domain ··········································································································································· 244
Submitting a PKI certificate request ···························································································································· 246
Submitting a certificate request in auto mode ·································································································· 246
Submitting a certificate request in manual mode ····························································································· 246
Retrieving a certificate manually ································································································································ 247
Configuring PKI certificate verification ······················································································································ 248
Configuring CRL-checking-enabled PKI certificate verification ······································································· 248
Configuring CRL-checking-disabled PKI certificate verification ······································································ 249
Destroying a local RSA key pair ································································································································ 249
Deleting a certificate ···················································································································································· 250
Configuring an access control policy ························································································································ 250
Displaying and maintaining PKI ································································································································· 251
PKI configuration examples ········································································································································· 251
Requesting a certificate from a CA server running RSA Keon ······································································· 251
Requesting a certificate from a CA server running Windows 2003 Server ················································· 254
Configuring a certificate attribute-based access control policy ······································································ 257
v
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A3100-48 v2

Table of Contents