Configuring A Certificate Attribute-Based Access Control Policy - 3Com 4500G Family Configuration Manual

24/48 port
Hide thumbs Also See for 4500G Family:
Table of Contents

Advertisement

X509v3 Subject Key Identifier:
B68E4107 91D7C44C 7ABCE3BA 9BF385F8 A448F4E1
X509v3 Authority Key Identifier:
keyid:9D823258 EADFEFA2 4A663E75 F416B6F6 D41EE4FE
X509v3 CRL Distribution Points:
URI:http://l00192b/CertEnroll/CA%20server.crl
URI:file://\\l00192b\CertEnroll\CA server.crl
Authority Information Access:
CA Issuers - URI:http://l00192b/CertEnroll/l00192b_CA%20server.crt
CA Issuers - URI:file://\\l00192b\CertEnroll\l00192b_CA server.crt
1.3.6.1.4.1.311.20.2:
Signature Algorithm: sha1WithRSAEncryption
81029589 7BFA1CBD 20023136 B068840B
(Omitted)
You can also use some other display commands to view detailed information about the CA certificate.
Refer to the display pki certificate ca domain command in PKI Commands of the Security Volume.

Configuring a Certificate Attribute-Based Access Control Policy

Network requirements
The client accesses the remote HTTP Security (HTTPS) server through the HTTPS protocol.
SSL is configured to ensure that only legal clients log into the HTTPS server.
Create a certificate attribute-based access control policy to control access to the HTTPS server.
Figure 1-4 Configure a certificate attribute-based access control policy
Configuration procedure
.0.I.P.S.E.C.I.n.t.e.r.m.e.d.i.a.t.e.O.f.f.l.i.n.e
1-18

Hide quick links:

Advertisement

Chapters

Table of Contents
loading

Table of Contents