![H3C S5120-SI Series Operation Manual Download Page 435](http://html2.mh-extra.com/html/h3c/s5120-si-series/s5120-si-series_operation-manual_3711174435.webp)
1-20
(Omitted)
You can also use some other
display
commands to view detailed information about the CA certificate.
Refer to the
display pki certificate ca
domain
command in
PKI Commands
.
Configuring a Certificate Attribute-Based Access Control Policy
Network requirements
z
The client accesses the remote HTTP Security (HTTPS) server through the HTTPS protocol.
z
SSL is configured to ensure that only legal clients log into the HTTPS server.
z
Create a certificate attribute-based access control policy to control access to the HTTPS server.
Figure 1-4
Configure a certificate attribute-based access control policy
Configuration procedure
z
For detailed information about SSL configuration, refer to
SSL Configuration
.
z
For detailed information about HTTPS configuration, refer to
HTTP Configuration
.
z
The PKI domain to be referenced by the SSL policy must be created in advance. For detailed
configuration of the PKI domain, refer to
Configure the PKI domain
.
1) Configure the HTTPS server
# Configure the SSL policy for the HTTPS server to use.
<Switch> system-view
[Switch] ssl server-policy myssl
[Switch-ssl-server-policy-myssl] pki-domain 1
[Switch-ssl-server-policy-myssl]
client-verify enable
[Switch-ssl-server-policy-myssl] quit
2) Configure the certificate attribute group
# Create certificate attribute group
mygroup1
and add two attribute rules. The first rule defines that the
DN of the subject name includes the string
aabbcc
, and the second rule defines that the IP address of
the certificate issuer is 10.0.0.1.
[Switch] pki certificate attribute-group mygroup1
[Switch-pki-cert-attribute-group-mygroup1] attribute 1 subject-name dn ctn aabbcc
[Switch-pki-cert-attribute-group-mygroup1] attribute 2 issuer-name ip equ 10.0.0.1