7-5
Configuring Secure Socket Layer (SSL)
Prerequisite for Using SSL
Prerequisite for Using SSL
Before using the switch as an SSL server, you must install a publicly or
commercially available SSL enabled web browser application on the com-
puter(s) you use for management access to the switch.
Steps for Configuring and Using SSL for
Switch and Client Authentication
The general steps for configuring SSL include:
A. Client Preparation
1.
Install an SSL capable browser application on a management station
you want to use for access to the switch. (Refer to the documentation
provided with your browser.)
N o t e :
The latest versions of Microsoft Internet Explorer and Netscape web browser
support SSL and TLS functionality. See the browser documentation for addi-
tional details
B. Switch Preparation
1.
Assign a login (Operator) and enable (Manager) password on the
switch (page 7-7).
2.
Generate a host certificate on the switch (page 7-9).
i.
Generate certificate key pair
ii.
Generate host certificate
You need to do this only once. The switch's own public/private
certificate key pair and certificate are stored in the switch's flash
memory and are not affected by reboots or the erase startup-config
command. (You can remove or replace this certificate, if necessary.)
The certificate key pair and the SSH key pair are independent of each
other, which means a switch can have two keys pairs stored in flash.
3.
Enable SSL on the switch (page 7-17).
4.
Use your SSL enabled browser to access the switch using the switch’s
IP address or DNS name (if allowed by your browser). Refer to the
documentation provided with the browser application.
Summary of Contents for ProCurve 2510G Series
Page 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Page 2: ......
Page 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Page 12: ...x ...
Page 26: ...1 10 Getting Started Need Only a Quick Start ...
Page 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Page 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Page 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Page 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Page 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Page 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Page 318: ...8 Index ...
Page 319: ......