Red Hat CERTIFICATE SYSTEM 8 Install Manual page 65

Hide thumbs Also See for CERTIFICATE SYSTEM 8:
Table of Contents

Advertisement

The hostname can be the fully-qualified domain name or an IPv4 or IPv6 address.
NOTE
One thing that can derail subsystem configuration or function is having services that
are unable to connect with each other. If servers that need to communicate with each
other are on different servers or networks, when the firewalls and iptables must be
configured to give the required access.
If the Red Hat Directory Server instances is on a different server or network than
the Certificate System subsystem, then make sure that the Certificate System host's
firewall allows access to whatever LDAP port was set in the previous configuration
panel.
Installation will not complete if iptables is not configured properly. To configure
iptables, see the Red Hat Enterprise Linux Deployment Guide, such as
iptables."
10. Select the token which will store the Certificate System certificates and keys; a list of detected
hardware tokens and databases is given.
4
It is also possible to simply turn iptables off.
Configuring a TPS
"Using
55

Advertisement

Table of Contents
loading

This manual is also suitable for:

System 8 - install guide 25-03-2010

Table of Contents