7-16
Configuring Secure Socket Layer (SSL)
General Operating Rules and Notes
that involves having the certificate authority verify the certificate request and
then digitally signing the request to generate a certificate response (the usable
server host certificate). The third phase is the download phase consisting of
pasting to the switch web server the certificate response, which is then
validated by the switch and put into use by enabling SSL.
To generate a certificate request from the web browser interface:
i.
Select the
Security
tab, then the
[SSL]
button.
ii.
Select the
Create Certificate/Certificate Request
radio button.
iii. Select
Create CA Request
from the
Certificate Type
drop-down list.
iv. Select the key size from the
RSA Key Size
drop-down list. If you
want to re-use the current certificate key, select
Current
from this
list.
v.
Fill in the remaining certificate arguments. (Refer to “Comments
on Certificate Fields.” on page 7-11.)
vi. Click on
[Apply Changes]
to create the certificate request. A new
web browser page appears, consisting of two text boxes. The
switch uses the upper text box for the certificate request text. The
lower text box appears empty. You will use it for pasting in the
certificate reply after you receive it from the certificate authority.
(This authority must return a none-PEM encoded certificate
request reply.)
vii. After the certificate authority processes your request and sends
you a certificate reply (that is, an installable certificate), copy and
paste the certificate into the lower text box.
viii. Click on the
[Apply Changes]
button to install the certificate.
Содержание ProCurve 2510G Series
Страница 1: ...Access Security Guide www procurve com ProCurve Series 2510G Switches Y 11 XX ...
Страница 2: ......
Страница 3: ...ProCurve Series 2510G Switches Access Security Guide June 2008 ...
Страница 12: ...x ...
Страница 26: ...1 10 Getting Started Need Only a Quick Start ...
Страница 105: ...4 31 TACACS Authentication Configuring TACACS on the Switch ...
Страница 106: ...4 32 TACACS Authentication Configuring TACACS on the Switch ...
Страница 176: ...6 30 Configuring Secure Shell SSH Messages Related to SSH Operation ...
Страница 198: ...7 22 Configuring Secure Socket Layer SSL Common Errors in SSL Setup ...
Страница 296: ...9 40 Configuring and Monitoring Port Security Configuring Protected Ports ...
Страница 310: ...10 14 Using Authorized IP Managers Operating Notes ...
Страница 318: ...8 Index ...
Страница 319: ......