
Operation Manual – PKI
H3C S5500-EI Series Ethernet Switches
Chapter 1 PKI Configuration
1-4
III. Web security
For Web security, two peers can establish a Secure Sockets Layer (SSL) connection
first for transparent and secure communications at the application layer. With PKI, SSL
enables communications with encryption between a browser and a server. Both the
communication parties can identify the identity of each other through digital certificates.
1.1.5 Operation of PKI
In a PKI-enabled network, an entity can request a local certificate from the CA and the
device can check the validity of certificates. Here is how it works:
1)
An entity submits a certificate request to the CA.
2) RA reviews the identity of the entity and then sends the identity information and
the public key with a digital signature to the CA.
3) The CA validates the digital signature, approves the application, and issues a
certificate.
4)
The RA receives the certificate from the CA, sends it to the LDAP server to provide
directory navigation service, and notifies the entity that the certificate is
successfully issued.
5)
The entity retrieves the certificate. With the certificate, the entity can communicate
with other entities safely through encryption and digital signature.
6)
The entity makes a request to the CA when it needs to revoke its certificate, while
the CA approves the request, updates the CRLs and transfers the CRLs to the
LDAP server.
1.2 PKI Configuration Task List
Complete the following tasks to configure PKI:
Task
Remarks
Configuring an Entity DN
Required
Configuring a PKI Domain
Required
Submitting a Certificate Request in
Auto Mode
Submitting a Certificate
Request in Auto Mode
Submitting a Certificate Request in
Manual Mode
Required
Use either
approach
Retrieving a Certificate Manually
Optional
Configuring PKI Certificate Validation
Optional
Destroying a Local RSA Key Pair
Optional
Deleting a Certificate
Optional
Configuring an Access Control Policy
Optional