HP 635n - JetDirect IPv6/IPsec Print Server How To Use Manual page 8

How to use 802.1x on hp jetdirect print servers
Hide thumbs Also See for 635n - JetDirect IPv6/IPsec Print Server:
Table of Contents

Advertisement

Figure 9 – Certificate Details
In Figure 9, we see there is a
red X
on the certificate, indicative of a security problem. In addition,
there is a very specific error message: "This certificate cannot be verified up to a trusted certification
authority." Here we see that the "Issued By" is entitled "RootCA". What the message is trying to say
is that "RootCA", who issued the certificate "635n", is not trusted.
A useful analogy is to think of the certificate issuer like a Department of Motor Vehicles (DMV). Each
state in the United States has a DMV run by the state's government. The DMV issues driver's licenses
which grant the privilege to drive in a given state. A person that goes to the DMV to get a driver's
license must pass a series of tests that helps the DMV determine if they are fit to drive on the state's
roads. The state's Highway Patrol, a group which enforces the rules of the road, recognizes the
validity of the DMV to issue driver's licenses. Therefore, if one violates one of the rules of the road
and is pulled over by a Highway Patrol officer, showing a driver's license issued by the DMV is a
requirement. The Highway Patrol will not recognize a driver's license issued by an institution other
than the DMV as being valid. In short, the DMV is a trusted third party that issues "certificates"
(driver's licenses) to individuals. These "certificates", issued by the DMV, are trusted by the Highway
Patrol.
The Security Alert dialog is troubling because it is indicative of a trust problem. In the terms of our
analogy, it would be like a driver, who has been pulled over by the Highway Patrol, handing the
officer a driver's license that the driver's mother wrote for him indicating that her son had been
granted the privilege to drive in the state. While a note from mom may be trusted by her sister, it isn't
trusted by the Highway Patrol.
In essence, a digital certificate, one used by computers, binds an identity to a key and needs to be
issued by a trusted third party. What is a key? A key is a secret that is used in cryptographic
algorithms. There are public keys and private keys used for asymmetric cryptography and symmetric
keys used for symmetric cryptography. Let's look at symmetric cryptography first.
8

Advertisement

Table of Contents
loading

This manual is also suitable for:

635n ipv6/ipsec

Table of Contents