HP A5830 Series Configuration Manual page 160

Security switch
Hide thumbs Also See for A5830 Series:
Table of Contents

Advertisement

Fingerprint for root certificate verification—After receiving the root certificate of the CA, an entity
needs to verify the fingerprint of the root certificate, namely, the hash value of the root certificate
content. This hash value is unique to every certificate. If the fingerprint of the root certificate does
not match the one configured for the PKI domain, the entity rejects the root certificate.
To configure a PKI domain:
To do...
1.
Enter system view.
2.
Create a PKI domain and
enter its view.
3.
Specify the trusted CA.
4.
Specify the entity for
certificate request.
5.
Specify the authority for
certificate request.
6.
Configure the certificate
request URL.
7.
Configure the polling interval
and attempt limit for querying
the certificate request status.
8.
Specify the LDAP server.
9.
Configure the fingerprint for
root certificate verification.
Up to two PKI domains can be created on a switch.
The CA name is required only when you retrieve a CA certificate. It is not used for local certificate
requests.
The certificate request URL does not support domain name resolution.
Use the command...
system-view
pki domain domain-name
ca identifier name
certificate request entity entity-
name
certificate request from { ca | ra }
certificate request url url-string
certificate request polling { count
count | interval minutes }
ldap-server ip ip-address [ port
port-number ] [ version version-
number ]
root-certificate fingerprint { md5 |
sha1 } string
152
Remarks
Required.
No PKI domain exists by default.
Required.
No trusted CA is specified by
default.
Required.
No entity is specified by default.
The specified entity must exist.
Required.
No authority is specified by
default.
Required.
No certificate request URL is
configured by default.
Optional.
The polling is executed for up to
50 times at the interval of 20
minutes by default.
Optional.
No LDP server is specified by
default.
Required when the certificate
request mode is auto and optional
when the certificate request mode
is manual. In the latter case, if
you do not configure this
command, the fingerprint of the
root certificate must be verified
manually.
No fingerprint is configured by
default.

Advertisement

Table of Contents
loading

Table of Contents