Chapter 34: PKI Certificates and SSL
632
Section IX: Management Security
Configuring SSL
To configure the SSL protocol, perform the following procedure:
1. From the Main Menu, type
7
to select Security and Services.
2. From the Security and Services menu, type
9
to select Secure Socket
Layer (SSL).
The Secure Socket Layer (SSL) menu is shown in Figure 235.
Figure 235. Secure Socket Layer (SSL) Menu
3. Type
1
to select Maximum Number of Sessions to increase the
number of sessions.
The following prompt is displayed:
Enter maximum SSL sessions value -> [1 to 100] 50
Enter a value from 1 to 100. The maximum number of sessions is used
to speed up a connection. By increasing the number of sessions, you
increase HTTPS performance. However, increasing the number of
sessions also increases the memory requirements. The default is 50.
4. Type
2
to select Session Cache Timeout to increase or decrease the
timer that determines when the session cache times out.
The following prompt is displayed:
Enter Cache timeout value -> [1 to 600] 300
Enter a value, in seconds, from 1 to 600. The default is 300 seconds.
5. To permanently save your change, return to the Main Menu and type
S
to select Save Configuration Changes.
Allied Telesis AT-9424T/SP - AT-S63
Marketing
User: Manager
11:20:02 02-Mar-2005
Secure Socket Layer (SSL)
1 - Maximum Number of Sessions......... 50
2 - Session Cache Timeout.............. 300 seconds
R - Return to Previous Menu
Enter your selection?
Summary of Contents for AT-9400
Page 16: ...Figures 16 ...
Page 18: ...Tables 18 ...
Page 28: ...Preface 28 ...
Page 30: ...30 Section I Basic Operations ...
Page 60: ...Chapter 1 Basic Switch Parameters 60 Section I Basic Operations ...
Page 64: ...Chapter 2 Port Parameters 64 Section I Basic Operations Port Type The port type ...
Page 84: ...Chapter 2 Port Parameters 84 Section I Basic Operations ...
Page 124: ...Chapter 6 Static Port Trunks 124 Section I Basic Operations ...
Page 144: ...144 Section II Advanced Operations ...
Page 196: ...Chapter 10 File Downloads and Uploads 196 Section II Advanced Operations ...
Page 218: ...Chapter 11 Event Logs and the Syslog Client 218 Section II Advanced Operations ...
Page 242: ...Chapter 13 Access Control Lists 242 Section II Advanced Operations ...
Page 294: ...294 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 314: ...Chapter 19 MLD Snooping 314 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Page 318: ...318 Section IV SNMPv3 ...
Page 416: ...Chapter 21 SNMPv3 416 Section IV SNMPv3 ...
Page 418: ...418 Section V Spanning Tree Protocols ...
Page 470: ...470 Section VI Virtual LANs ...
Page 520: ...Chapter 26 Multiple VLAN Modes 520 Section VI Virtual LANs ...
Page 532: ...Chapter 27 Protected Ports VLANs 532 Section VI Virtual LANs ...
Page 546: ...546 Section VII Internet Protocol Routing ...
Page 560: ...560 Section VIII Port Security ...
Page 568: ...Chapter 30 MAC Address based Port Security 568 Section VIII Port Security ...
Page 586: ...Chapter 31 802 1x Port based Network Access Control 586 Section VIII Port Security ...
Page 588: ...588 Section IX Management Security ...
Page 610: ...Chapter 33 Encryption Keys 610 Section IX Management Security ...
Page 650: ...Chapter 36 TACACS and RADIUS Protocols 650 Section IX Management Security ...
Page 660: ...Chapter 37 Management Access Control List 660 Section IX Management Security ...
Page 668: ...Index 668 ...