![HP HP ProCurve Series 6600 Access Security Manual Download Page 410](http://html.mh-extra.com/html/hp/hp-procurve-series-6600/hp-procurve-series-6600_access-security-manual_163101410.webp)
9-8
Configuring Secure Socket Layer (SSL)
Configuring the Switch for SSL Operation
CLI commands used to generate a Server Host Certificate.
To generate a host certificate from the CLI:
i.
Generate a certificate key pair. This is done with the
crypto key
generate cert
command. The default key size is 512.
N o t e
If a certificate key pair is already present in the switch, it is not necessary to
generate a new key pair when generating a new certificate. The existing key
pair may be re-used and the crypto key generate cert command does not have
to be executed
ii.
Generate a new self-signed host certificate. This is done with the
crypto host-cert generate self-signed [
Arg-List]
command.
N o t e
When generating a self-signed host certificate on the CLI if there is not
certificate key generated this command will fail.
Comments on Certificate Fields.
There are a number arguments used in the generation of a server certificate.
table 9-1, “Certificate Field Descriptions” describes these arguments.
Syntax:
crypto key generate cert rsa bits < 1024 | 2048>
Generates a key pair for use in the certificate.
crypto key zeroize cert
Erases the switch’s certificate key and disables SSL opera-
tion.
crypto host-cert generate self-signed [arg-list]
Generates a self signed host certificate for the switch. If a
switch certificate already exists, replaces it with a new
certificate. (See the Note, above.)
crypto host-cert zeroize
Erases the switch’s host certificate and disables SSL opera-
tion.
Summary of Contents for HP ProCurve Series 6600
Page 2: ......
Page 6: ...iv ...
Page 26: ...xxiv ...
Page 102: ...2 48 Configuring Username and Password Security Password Recovery ...
Page 204: ...4 72 Web and MAC Authentication Client Status ...
Page 550: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Page 612: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Page 734: ...14 44 Configuring and Monitoring Port Security Operating Notes for Port Security ...
Page 756: ...16 8 Key Management System Configuring Key Chain Management ...
Page 776: ...20 Index web server proxy 14 42 webagent access 6 6 wildcard See ACL wildcard See ACL ...
Page 777: ......