1
An entity or organization that wants a digital certificate requests one through a CSR.
2
To request a digital certificate through a CSR, a key pair is generated and the CSR is signed using the secret private key. The CSR
contains information identifying the applicant and the applicant's public key. This public key is used to verify the signature of the CSR
and the Distinguished Name (DN).
3
This CSR is sent to a Certificate Authority (CA). The CA verifies the certificate and signs it using the CA's own private key.
4
The CA then issues the certificate by binding a public key to a particular distinguished name (DN). This certificate becomes the
entity's trusted root certificate.
Advantages of X.509v3 certificates
Public key authentication is preferred over password-based authentication, although both may be used in conjunction, for various reasons.
Public-key authentication provides the following advantages over normal password-based authentication:
•
Public-key authentication avoids the human problems of low-entropy password selection and provides more resistance to brute-force
attacks than password-based authentication.
•
It facilitates trusted, provable identities—when using certificates signed by trusted CAs.
•
It also provides integrity and confidentiality in addition to authentication.
X.509v3 support in Dell Networking OS
Dell Networking OS supports X.509v3 standards.
Many organizations or entities need to let their customers know that the connection to their devices and network is secure. These
organizations pay an internationally trusted Certificate Authorities (CAs) such as VeriSign, DigiCert, and so on, to sign a certificate for their
domain.
To implement a X.509v3 infrastructure, Dell Networking OS recommends you to act as your own CA. Common use cases for acting as your
own CA include issuing certificates to clients to allow them to authenticate to a server. For example, Apache, OpenVPN, and so on.
Acting as a certificate authority (CA) means dealing with cryptographic pairs of private keys and public certificates. The first cryptographic
pair you create is the root pair. This root pair consists of the root key (ca.key.pem) and root certificate—ca.cert.pem. This pair forms the
identity of your CA.
Typically, a root CA does not sign server or client certificates directly. The root CA is only ever used to create one or more intermediate CAs.
These intermediate CAs are trusted by the root CA to sign certificates on their behalf. This is the best practice. It allows the root key to be
kept offline and used to a minimal extent, as any compromise of the root key is disastrous.
For more generic information on setting up your own Certificate Authority (CA), see
https://jamielinux.com/docs/openssl-certificate-
The following figure illustrates a sample network topology in which a simple X.509v3 infrastructure is implemented:
X.509v3
1029
Содержание S3048-ON
Страница 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Страница 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Страница 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Страница 241: ...Dell Control Plane Policing CoPP 241 ...
Страница 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Страница 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Страница 429: ...Figure 54 Inspecting Configuration of LAG 10 on ALPHA Link Aggregation Control Protocol LACP 429 ...
Страница 432: ...Figure 56 Inspecting a LAG Port on BRAVO Using the show interface Command 432 Link Aggregation Control Protocol LACP ...
Страница 433: ...Figure 57 Inspecting LAG 10 Using the show interfaces port channel Command Link Aggregation Control Protocol LACP 433 ...
Страница 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Страница 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Страница 479: ...Figure 75 Configuring PIM in Multiple Routing Domains Multicast Source Discovery Protocol MSDP 479 ...
Страница 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Страница 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Страница 634: ...protocol spanning tree pvst no disable vlan 300 bridge priority 4096 634 Per VLAN Spanning Tree Plus PVST ...
Страница 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Страница 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...