332
Item Description
information.
Available PKI entities are those that have been configured.
Institution
Select the authority for certificate request.
•
CA
—Indicates that the entity requests a certificate from a CA.
•
RA
—Indicates that the entity requests a certificate from an RA.
RA is recommended.
Requesting URL
Enter the URL of the RA.
The entity will submit the certificate request to the server at this URL through the SCEP
protocol. The SCEP protocol is intended for communication between an entity and an
authentication authority.
In offline mode, this item is optional. In other modes, this item is required.
IMPORTANT:
This item does not support domain name resolution.
LDAP IP
Enter the IP address, port number and version of the LDAP server.
In a PKI system, the storage of certificates and CRLs is a crucial problem, which is
usually addressed by deploying an LDAP server..
Port
Version
Request Mode
Select the online certificate request mode, which can be auto or manual.
Password
Set a password for certificate revocation and re-enter it for confirmation.
The two boxes are available only when the certificate request mode is set to
Auto
..
Confirm Password
Fingerprint Hash
Specify the fingerprint used for verifying the CA root certificate.
After receiving the root certificate of the CA, an entity needs to verify the fingerprint of
the root certificate, namely, the hash value of the root certificate content. This hash
value is unique to every certificate. If the fingerprint of the root certificate does not
match the one configured for the PKI domain, the entity will reject the root certificate.
•
If you specify
MD5
as the hash algorithm, enter an MD5 fingerprint. The
fingerprint must a string of 32 characters in hexadecimal notation.
•
If you specify
SHA1
as the hash algorithm, enter an SHA1 fingerprint. The
fingerprint must a string of 40 characters in hexadecimal notation.
•
If you do not specify the fingerprint hash, do not enter any fingerprint. The entity
will not verify the CA root certificate, and you yourself must make sure the CA
server is trusted.
IMPORTANT:
The fingerprint must be configured if you specify the certificate request mode as
Auto
.
If you specify the certificate request mode as
Manual
, you can leave the fingerprint
settings null. If you do not configure the fingerprint, the entity will not verify the CA root
certificate and you yourself must make sure the CA server is trusted.
Fingerprint
Polling Count
Set the polling interval and attempt limit for querying the certificate request status.
After an entity makes a certificate request, the CA might need a long period of time if it
verifies the certificate request in manual mode. During this period, the applicant needs
to query the status of the request periodically to get the certificate as soon as possible
after the certificate is signed..
Polling Interval
Enable CRL
Checking
Select this box to specify that CRL checking is required during certificate verification.
CRL Update
Period
Enter the CRL update period, that is, the interval at which the PKI entity downloads the
latest CRLs.
This item is available after you click the
Enable CRL Checking
box.
By default, the CRL update period depends on the next update field in the CRL file.
CRL URL
Enter the URL of the CRL distribution point. The URL can be an IP address or a domain
Summary of Contents for FlexNetwork NJ5000
Page 12: ...x Index 440 ...
Page 39: ...27 Figure 16 Configuration complete ...
Page 67: ...55 Figure 47 Displaying the speed settings of ports ...
Page 78: ...66 Figure 59 Loopback test result ...
Page 158: ...146 Figure 156 Creating a static MAC address entry ...
Page 183: ...171 Figure 171 Configuring MSTP globally on Switch D ...
Page 243: ...231 Figure 237 IPv6 active route table ...