9-4
Configuring Secure Socket Layer (SSL)
Prerequisite for Using SSL
Prerequisite for Using SSL
Before using the switch as an SSL server, you must install a publicly or
commercially available SSL-enabled web browser application on the com-
puter(s) you use for management access to the switch.
Steps for Configuring and Using SSL for
Switch and Client Authentication
The general steps for configuring SSL include:
A. Client Preparation
1.
Install an SSL capable browser application on a management station
you want to use for access to the switch. (Refer to the documentation
provided with your browser.)
N o t e
The latest versions of Microsoft Internet Explorer and Netscape web browser
support SSL and TLS functionality. See browser documentation for additional
details
B. Switch Preparation
1.
Assign a login (Operator) and enable (Manager) password on the
switch. (page 9-6)
2.
Generate a host certificate on the switch. (page 9-6)
i.
Generate certificate key pair
ii.
Generate host certificate
You need to do this only once. The switch's own public/private
certificate key pair and certificate are stored in the switch's flash
memory and are not affected by reboots or the erase startup-config
command. (You can remove or replace this certificate, if necessary.)
The certificate key pair and the SSH key pair are independent of each
other, which means a switch can have two keys pairs stored in flash.
Содержание E3800 Series
Страница 1: ...HP Switch Software E3800 switches Software version KA 15 03 September 2011 Access Security Guide ...
Страница 2: ......
Страница 3: ...HP Networking E3800 Switches Access Security Guide September 2011 KA 15 03 ...
Страница 30: ...xxviii ...
Страница 86: ...2 36 Configuring Username and Password Security Password Recovery ...
Страница 186: ...4 72 Web and MAC Authentication Client Status ...
Страница 290: ...6 74 RADIUS Authentication Authorization and Accounting Dynamic Removal of Authentication Limits ...
Страница 364: ...8 32 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 510: ...10 130 IPv4 Access Control Lists ACLs General ACL Operating Notes ...
Страница 548: ...11 38 Configuring Advanced Threat Protection Using the Instrumentation Monitor ...
Страница 572: ...12 24 Traffic Security Filters and Monitors Configuring Traffic Security Filters ...
Страница 659: ...14 11 Configuring and Monitoring Port Security Port Security Figure 14 5 Examples of Show Mac Address Outputs ...
Страница 730: ...20 Index ...
Страница 731: ......