HP 6600 Security Configuration Manual page 7

Table of Contents

Advertisement

Configuring a user profile ······································································································································ 200
Overview ······································································································································································· 200
User profile configuration task list ······························································································································ 200
Creating a user profile ················································································································································ 200
Performing configurations in user profile view ········································································································· 201
Enabling a user profile ················································································································································ 201
Displaying and maintaining user profile ··················································································································· 201
Configuring password control ································································································································ 202
Overview ······································································································································································· 202
FIPS compliance ··························································································································································· 204
Password control configuration task list ····················································································································· 204
Enabling password control ········································································································································· 205
Setting global password control parameters ············································································································ 206
Setting user group password control parameters ····································································································· 207
Setting local user password control parameters ······································································································· 208
Setting super password control parameters ·············································································································· 208
Setting a local user password in interactive mode ··································································································· 209
Displaying and maintaining password control ········································································································· 209
Password control configuration example ·················································································································· 210
Configuring RSH ····················································································································································· 213
Configuration prerequisites ········································································································································· 213
Configuration procedure ············································································································································· 213
RSH configuration example ········································································································································ 213
Managing public keys ············································································································································ 216
FIPS compliance ··························································································································································· 216
Configuration task list ·················································································································································· 216
Creating a local asymmetric key pair ························································································································ 217
Displaying or exporting the local host public key ···································································································· 218
Displaying and recording the host public key information ······················································································ 218
Displaying the host public key in a specific format and saving it to a file ···························································· 218
Exporting the host public key in a specific format to a file ····················································································· 219
Destroying a local asymmetric key pair ···················································································································· 219
Specifying the peer public key on the local device ·································································································· 219
Displaying public keys ················································································································································· 220
Public key configuration examples ····························································································································· 221
Manually specifying the peer public key on the local device ········································································ 221
Importing a public key from a public key file ··································································································· 223
Configuring PKI ······················································································································································· 226
Overview ······································································································································································· 226
PKI terms ······························································································································································· 226
PKI architecture ···················································································································································· 227
PKI operation ······················································································································································· 228
PKI applications ··················································································································································· 228
FIPS compliance ··························································································································································· 228
PKI configuration task list ············································································································································ 228
Configuring a PKI entity ·············································································································································· 229
Configuring a PKI domain ··········································································································································· 230
Requesting a certificate ··············································································································································· 232
Configuring automatic certificate request ········································································································· 232
Manually requesting a certificate ······················································································································ 232
Obtaining certificates ·················································································································································· 233
Verifying PKI certificates ·············································································································································· 234
v
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

This manual is also suitable for:

Hsr6600

Table of Contents