Configuring A Certificate Attribute-Based Access Control Policy - H3C S5500-EI series Operation Manual

Hide thumbs Also See for S5500-EI series:
Table of Contents

Advertisement

Operation Manual – PKI
H3C S5500-EI Series Ethernet Switches
Signature Algorithm: sha1WithRSAEncryption
You can also use some other display commands to view detailed information about the
CA certificate and CRLs. Refer to the parts related to display pki certificate ca
domain and display pki crl domain commands in PKI Commands.

1.12.2 Configuring a Certificate Attribute-Based Access Control Policy

I. Network requirements
The client accesses the remote HTTPS server through the HTTP Security (HTTPS)
protocol.
SSL is configured to ensure that only legal clients log into the HTTPS server.
Create a certificate attribute-based access control policy to control access to the
HTTPS server.
II. Networking diagram
Figure 1-3 Diagram for configuring a certificate attribute-based access control policy
19103439 3D4F9359 88FB59F3 8D4B2F6C
2B
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 CRL Distribution Points:
URI:http://4.4.4.133:447/myca.crl
836213A4 F2F74C1A 50F4100D B764D6CE
B30C0133 C4363F2F 73454D51 E9F95962
EDE9E590 E7458FA6 765A0D3F C4047BC2
9C391FF0 7383C4DF 9A0CCFA9 231428AF
987B029C C857AD96 E4C92441 9382E798
8FCC1E4A 3E598D81 96476875 E2F86C33
75B51661 B6556C5E 8F546E97 5197734B
C8C29AC7 E427C8E4 B9AAF5AA 80A75B3C
1-19
Chapter 1 PKI Configuration

Advertisement

Table of Contents
loading

Table of Contents