![H3C S5120-SI Series Скачать руководство пользователя страница 439](http://html2.mh-extra.com/html/h3c/s5120-si-series/s5120-si-series_operation-manual_3711174439.webp)
1-1
1
SSL Configuration
When configuring SSL, go to these sections for information you are interested in:
z
SSL Overview
z
SSL Configuration Task List
z
Displaying and Maintaining SSL
z
Troubleshooting SSL
SSL Overview
Secure Sockets Layer (SSL) is a security protocol that provides secure connection services for
TCP-based application layer protocols, for example, HTTP protocol. It is widely used in E-business and
online bank fields to ensure secure data transmission over the Internet.
SSL Security Mechanism
SSL provides these security services:
z
Confidentiality: SSL uses a symmetric encryption algorithm to encrypt data and uses the
asymmetric key algorithm of Rivest, Shamir, and Adelman (RSA) to encrypt the key to be used by
the symmetric encryption algorithm.
z
Authentication: SSL supports certificate-based identity authentication of the server and client by
using the digital signatures, with the authentication of the client being optional. The SSL server and
client obtain certificates from a certificate authority (CA) through the Public Key Infrastructure
(PKI).
z
Reliability: SSL uses the key-based message authentication code (MAC) to verify message
integrity. A MAC algorithm transforms a message of any length to a fixed-length message.
Figure
1-1
illustrates how SSL uses a MAC algorithm to verify message integrity. With the key, the sender
uses the MAC algorithm to compute the MAC value of a message. Then, the sender suffixes the
MAC value to the message and sends the result to the receiver. The receiver uses the same key
and MAC algorithm to compute the MAC value of the received message, and compares the locally
computed MAC value with that received. If the two matches, the receiver considers the message
intact; otherwise, the receiver considers that the message has been tampered with in transit and
discards the message.
Figure 1-1
Message integrity verification by a MAC algorithm
Содержание S5120-SI Series
Страница 61: ...7 8 Sysname ip http acl 2030...
Страница 138: ...2 10 PORT VLAN MODE GigabitEthernet1 0 1 2 MANUAL...
Страница 186: ...1 46 Instance Vlans Mapped 0 1 to 9 11 to 19 21 to 29 31 to 4094 1 10 2 20 3 30...
Страница 218: ...ii Displaying and Maintaining BOOTP Client Configuration 4 2 BOOTP Client Configuration Example 4 3...
Страница 255: ...1 12...
Страница 381: ...ii Troubleshooting RADIUS 1 32...
Страница 577: ...1 8 Return to the upper directory Sysname cd Display the current working directory Sysname pwd flash...