Allied-telesis AT-S60 Instrukcja Użytkownika Strona 9

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 858
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 8
AT-S60 Management Software User’s Guide
9
Section V
Security Features
.....................................................................................................................................................................468
Chapter 21
Port Security ...................................................................................................................................................................................................... 469
Port Security Overview .................................................................................................................................................................................... 470
Automatic ................................................................................................................................................................................................... 470
Limited ........................................................................................................................................................................................................ 470
Secured ....................................................................................................................................................................................................... 471
Locked ......................................................................................................................................................................................................... 471
Security Violations and Intrusion Actions ....................................................................................................................................... 472
Configuring Port Security ............................................................................................................................................................................... 473
Chapter 22
Web Server ......................................................................................................................................................................................................... 477
Web Server Overview ...................................................................................................................................................................................... 478
Protocols Supported .............................................................................................................................................................................. 478
Configuring the Web Server for Security Features ............................................................................................................................... 479
Configuring SSL Certificates .......................................................................................................................................................................... 481
Configuring Self-Signed Certificates ................................................................................................................................................ 481
Configuring CA Certificates ................................................................................................................................................................. 482
Chapter 23
Encryption .......................................................................................................................................................................................................... 484
Encryption Overview ....................................................................................................................................................................................... 485
Data Encryption ................................................................................................................................................................................................. 486
Symmetrical Encryption ........................................................................................................................................................................ 486
Asymmetrical (Public Key) Encryption ............................................................................................................................................. 487
Data Authentication ......................................................................................................................................................................................... 489
Key Exchange Algorithms .............................................................................................................................................................................. 490
Configuring Keys for Encryption ................................................................................................................................................................. 491
Configuring a Distinguished Name and Keys ............................................................................................................................... 491
Modifying and Deleting Keys .............................................................................................................................................................. 495
Exporting Keys .......................................................................................................................................................................................... 497
Importing Keys ......................................................................................................................................................................................... 498
Chapter 24
Public Key Infrastructure (PKI) .................................................................................................................................................................501
Public Key Infrastructure Overview ............................................................................................................................................................ 502
Public Keys ................................................................................................................................................................................................. 502
Message Encryption ............................................................................................................................................................................... 503
Digital Signatures .................................................................................................................................................................................... 503
Certificates ................................................................................................................................................................................................. 503
Elements of a Public Key Infrastructure ........................................................................................................................................... 504
Certificate Validation .............................................................................................................................................................................. 505
Certificate Revocation Lists (CRLs) .................................................................................................................................................... 506
PKI Implementation ......................................................................................................................................................................................... 507
PKI Standards ............................................................................................................................................................................................ 507
Certificate Retrieval and Storage ....................................................................................................................................................... 507
Configuring Certificates .................................................................................................................................................................................. 508
Creating Certificates ............................................................................................................................................................................... 508
Adding Certificates to the Database ................................................................................................................................................ 513
Deleting and Modifying Certificates ................................................................................................................................................ 515
Viewing Certificates ................................................................................................................................................................................ 518
Generating Enrollment Requests ................................................................................................................................................................ 521
Przeglądanie stron 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 857 858

Komentarze do niniejszej Instrukcji

Brak uwag