1-2
z
For details about symmetric key algorithms, asymmetric key algorithm RSA and digital signature,
refer to
Public Key Configuration
in the
Security Volume
.
z
For details about PKI, certificate, and CA, refer to
PKI Configuration
in the
Security Volume
.
SSL Protocol Stack
As shown in
Figure 1-2
, the SSL protocol consists of two layers of protocols: the SSL record protocol at
the lower layer and the SSL handshake protocol, change cipher spec protocol, and alert protocol at the
upper layer.
Figure 1-2
SSL protocol stack
z
SSL handshake protocol: As a very important part of the SSL protocol stack, it is responsible for
negotiating the cipher suite to be used during communication (including the symmetric encryption
algorithm, key exchange algorithm, and MAC algorithm), exchanging the key between the server
and client, and implementing identity authentication of the server and client. Through the SSL
handshake protocol, a session is established between a client and the server. A session consists of
a set of parameters, including the session ID, peer certificate, cipher suite, and master secret.
z
SSL change cipher spec protocol: Used for notification between a client and the server that the
subsequent packets are to be protected and transmitted based on the newly negotiated cipher
suite and key.
z
SSL alert protocol: Allowing a client and the server to send alert messages to each other. An alert
message contains the alert severity level and a description.
z
SSL record protocol: Fragmenting and compressing data to be transmitted, calculating and adding
MAC to the data, and encrypting the data before transmitting it to the peer end.
SSL Configuration Task List
Different parameters are required on the SSL server and the SSL client.
Complete the following tasks to configure SSL:
Task
Remarks
Configuring an SSL Server Policy
Required
Configuring an SSL Client Policy
Optional
Содержание 4500G PWR 24-Port
Страница 200: ...1 5 ProviderB GigabitEthernet1 0 2 undo stp enable ProviderB GigabitEthernet1 0 2 bpdu tunnel dot1q stp ...
Страница 252: ...1 7 Clearing ARP entries from the ARP table may cause communication failures ...
Страница 362: ...i Table of Contents 1 Dual Stack Configuration 1 1 Dual Stack Overview 1 1 Configuring Dual Stack 1 1 ...
Страница 407: ...1 8 1 1 ms 1 ms 1 ms 1 1 6 1 2 1 ms 1 ms 1 ms 1 1 4 1 3 1 ms 1 ms 1 ms 1 1 2 2 Trace complete ...
Страница 786: ...1 16 3 In the case of PIM SM use the display current configuration command to check the BSR and RP information ...
Страница 1387: ...1 23 ...
Страница 1443: ...i Table of Contents 1 URPF Configuration 1 1 URPF Overview 1 1 What is URPF 1 1 How URPF Works 1 1 Configuring URPF 1 2 ...
Страница 1720: ...ii Single Device Upgrade 3 4 IRF System Upgrade 3 5 ...