3Com 4500G Family Configuration Manual page 704

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

1 PKI Configuration ······································································································································1-1
Introduction to PKI···································································································································1-1
PKI Overview···································································································································1-1
PKI Terms········································································································································1-1
Architecture of PKI···························································································································1-2
Applications of PKI ··························································································································1-3
Operation of PKI ······························································································································1-3
PKI Configuration Task List ····················································································································1-3
Configuring an Entity DN ························································································································1-4
Configuring a PKI Domain ······················································································································1-5
Submitting a PKI Certificate Request······································································································1-7
Submitting a Certificate Request in Auto Mode ··············································································1-7
Submitting a Certificate Request in Manual Mode ··········································································1-7
Retrieving a Certificate Manually ············································································································1-8
Configuring PKI Certificate Verification···································································································1-9
Destroying a Local RSA Key Pair ·········································································································1-10
Deleting a Certificate·····························································································································1-11
Configuring an Access Control Policy···································································································1-11
Displaying and Maintaining PKI ············································································································1-11
PKI Configuration Examples ·················································································································1-12
Requesting a Certificate from a CA Running RSA Keon ······························································1-12
Requesting a Certificate from a CA Running Windows 2003 Server············································1-15
Configuring a Certificate Attribute-Based Access Control Policy··················································1-18
Troubleshooting PKI······························································································································1-20
Failed to Retrieve a CA Certificate ································································································1-20
Failed to Request a Local Certificate ····························································································1-20
Failed to Retrieve CRLs ················································································································1-21
Table of Contents
i

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents