Chapter 33: Encryption Keys
596
Section IX: Management Security
Creating an Encryption Key
This section contains the procedure for creating an encryption key pair.
Caution
Key generation is a CPU-intensive process. Because this process
may affect switch behavior, Allied Telesis recommends creating
keys when the switch is not connected to a network or during
periods of low network activity.
To create an encryption key, perform the following procedure:
1. From the Main Menu, type
7
to select Security and Services.
The Security and Services menu is shown in Figure 71 on page 220.
2. From the Security and Services menu, type
7
to select Keys/Certificate
Configuration.
The Keys/Certificate Configuration menu is shown in Figure 221.
Figure 221. Keys/Certificate Configuration Menu
3. From the Keys/Certificates Configuration menu, type
2
to select Key
Management.
Allied Telesis AT-9424T/SP - AT-S63
Marketing
User: Manager
11:20:02 02-Mar-2005
Keys/Certificates Configuration
1 - Switch Distinguished Name (DN)
2 - Key Management
3 - Public Key Infrastructure (PKI) Configuration
R - Return to Previous Menu
Enter your selection?
Содержание AT-9400
Страница 16: ...Figures 16 ...
Страница 18: ...Tables 18 ...
Страница 28: ...Preface 28 ...
Страница 30: ...30 Section I Basic Operations ...
Страница 60: ...Chapter 1 Basic Switch Parameters 60 Section I Basic Operations ...
Страница 64: ...Chapter 2 Port Parameters 64 Section I Basic Operations Port Type The port type ...
Страница 84: ...Chapter 2 Port Parameters 84 Section I Basic Operations ...
Страница 124: ...Chapter 6 Static Port Trunks 124 Section I Basic Operations ...
Страница 144: ...144 Section II Advanced Operations ...
Страница 196: ...Chapter 10 File Downloads and Uploads 196 Section II Advanced Operations ...
Страница 218: ...Chapter 11 Event Logs and the Syslog Client 218 Section II Advanced Operations ...
Страница 242: ...Chapter 13 Access Control Lists 242 Section II Advanced Operations ...
Страница 294: ...294 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Страница 314: ...Chapter 19 MLD Snooping 314 Section III IGMP Snooping MLD Snooping and RRP Snooping ...
Страница 318: ...318 Section IV SNMPv3 ...
Страница 416: ...Chapter 21 SNMPv3 416 Section IV SNMPv3 ...
Страница 418: ...418 Section V Spanning Tree Protocols ...
Страница 470: ...470 Section VI Virtual LANs ...
Страница 478: ...Chapter 24 Port based and Tagged VLANs 478 Section VI Virtual LANs The new Sales VLAN has now been created ...
Страница 480: ...Chapter 24 Port based and Tagged VLANs 480 Section VI Virtual LANs The new Engineering VLAN has now been created ...
Страница 520: ...Chapter 26 Multiple VLAN Modes 520 Section VI Virtual LANs ...
Страница 532: ...Chapter 27 Protected Ports VLANs 532 Section VI Virtual LANs ...
Страница 546: ...546 Section VII Internet Protocol Routing ...
Страница 560: ...560 Section VIII Port Security ...
Страница 568: ...Chapter 30 MAC Address based Port Security 568 Section VIII Port Security ...
Страница 586: ...Chapter 31 802 1x Port based Network Access Control 586 Section VIII Port Security ...
Страница 588: ...588 Section IX Management Security ...
Страница 610: ...Chapter 33 Encryption Keys 610 Section IX Management Security ...
Страница 650: ...Chapter 36 TACACS and RADIUS Protocols 650 Section IX Management Security ...
Страница 660: ...Chapter 37 Management Access Control List 660 Section IX Management Security ...
Страница 668: ...Index 668 ...