HP 830 Series Configuration Manual page 442

Poe+ unified wired-wlan switch switching engine web-based
Hide thumbs Also See for HP 830 Series:
Table of Contents

Advertisement

Item
Description
Enter the URL of the RA.
The entity will submit the certificate request to the server at this URL through the SCEP
protocol. The SCEP protocol is intended for communication between an entity and an
authentication authority.
Requesting URL
In offline mode, this item is optional. In other modes, this item is required.
This item does not support domain name resolution.
LDAP IP
Enter the IP address, port number, and version of the LDAP server.
Port
In a PKI system, deploying an LDAP server solves an issue with the storage of certificates
and CRLs.
Version
Request Mode
Select the online certificate request mode: auto or manual.
Specify the fingerprint used for verifying the CA root certificate.
After receiving the root certificate of the CA, an entity needs to verify the fingerprint of the
root certificate, which is the hash value of the root certificate content. This hash value is
unique to every certificate. If the fingerprint of the root certificate does not match the
fingerprint configured for the PKI domain, the entity will reject the root certificate.
Hash
Fingerprint
The fingerprint must be configured if you specify the certificate request mode as Auto. If you
specify the certificate request mode as Manual, you can leave the fingerprint settings null. If
you do not configure the fingerprint, the entity will not verify the CA root certificate and you
yourself must make sure the CA server is trusted.
Set the polling interval and attempt limit for querying the certificate request status.
If an entity makes a certificate request in manual mode, the CA might require a lengthy
Polling Count
period of time to verify the request and sign the certificate. During this waiting period, the
Polling Interval
applicant should query the status of the request periodically to obtain the certificate as
soon as possible after the certificate is signed.
Enable CRL
Select this box to specify that CRL checking is required during certificate verification.
Checking
Enter the CRL update period, which is the interval at which the PKI entity downloads the
latest CRLs.
CRL Update Period
This item is available after you click the Enable CRL Checking box.
By default, the CRL update period depends on the next update field in the CRL file.
IMPORTANT:
If you specify MD5 as the hash algorithm, enter an MD5 fingerprint. The fingerprint
must be a string of 32 characters in hexadecimal notation.
If you specify SHA1 as the hash algorithm, enter an SHA1 fingerprint. The fingerprint
must be a string of 40 characters in hexadecimal notation.
If you do not specify the fingerprint hash, do not enter any fingerprint. The entity will
not verify the CA root certificate, and you must use a trusted CA server.
IMPORTANT:
430

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents