HP 6125G HP 6125G & 6125G/XG Blade Switches Security Configuration Gui - Page 6

Creating a local asymmetric key pair, Configuring an entity DN

Page 6 highlights

Cannot configure secure MAC addresses 132 Cannot change port security mode when a user is online 133 Configuring a user profile 134 Overview 134 User profile configuration task list 134 Creating a user profile 134 Applying a QoS policy 135 Enabling a user profile 135 Displaying and maintaining user profiles 136 Configuring password control 137 Overview 137 Password control configuration task list 139 Configuring password control 140 Enabling password control 140 Setting global password control parameters 141 Setting user group password control parameters 142 Setting local user password control parameters 142 Setting super password control parameters 143 Setting a local user password in interactive mode 144 Displaying and maintaining password control 144 Password control configuration example 144 Managing public keys 147 Overview 147 Configuration task list 147 Creating a local asymmetric key pair 148 Displaying or exporting the local host public key 148 Destroying a local asymmetric key pair 150 Specifying the peer public key on the local device 150 Displaying and maintaining public keys 151 Public key configuration examples 151 Manually specifying the peer public key on the local device 151 Importing a peer public key from a public key file 153 Configuring PKI 156 Overview 156 PKI terms 156 PKI architecture 157 PKI operation 157 PKI applications 158 PKI configuration task list 158 Configuring an entity DN 159 Configuring a PKI domain 160 Configuration guidelines 161 Configuration procedure 161 Submitting a PKI certificate request 161 Submitting a certificate request in auto mode 162 Submitting a certificate request in manual mode 162 Retrieving a certificate manually 163 Configuration guidelines 163 Configuration procedure 164 Configuring PKI certificate verification 164 Configuration guidelines 164 Configuring CRL-checking-enabled PKI certificate verification 164 iv

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285

iv
Cannot configure secure MAC addresses ········································································································ 132
Cannot change port security mode when a user is online·············································································· 133
Configuring a user profile ······································································································································ 134
Overview······································································································································································· 134
User profile configuration task list ······························································································································ 134
Creating a user profile ················································································································································ 134
Applying a QoS policy ··············································································································································· 135
Enabling a user profile ················································································································································ 135
Displaying and maintaining user profiles ·················································································································· 136
Configuring password control································································································································ 137
Overview······································································································································································· 137
Password control configuration task list
····················································································································· 139
Configuring password control ···································································································································· 140
Enabling password control
································································································································· 140
Setting global password control parameters
···································································································· 141
Setting user group password control parameters ···························································································· 142
Setting local user password control parameters ······························································································ 142
Setting super password control parameters ····································································································· 143
Setting a local user password in interactive mode ·························································································· 144
Displaying and maintaining password control ········································································································· 144
Password control configuration example ·················································································································· 144
Managing public keys ············································································································································ 147
Overview······································································································································································· 147
Configuration task list ·················································································································································· 147
Creating a local asymmetric key pair
························································································································ 148
Displaying or exporting the local host public key ···································································································· 148
Destroying a local asymmetric key pair ···················································································································· 150
Specifying the peer public key on the local device·································································································· 150
Displaying and maintaining public keys ··················································································································· 151
Public key configuration examples ····························································································································· 151
Manually specifying the peer public key on the local device ········································································ 151
Importing a peer public key from a public key file·························································································· 153
Configuring PKI ······················································································································································· 156
Overview······································································································································································· 156
PKI terms ······························································································································································· 156
PKI architecture ···················································································································································· 157
PKI operation ······················································································································································· 157
PKI applications ··················································································································································· 158
PKI configuration task list ············································································································································ 158
Configuring an entity DN
············································································································································ 159
Configuring a PKI domain··········································································································································· 160
Configuration guidelines ···································································································································· 161
Configuration procedure ···································································································································· 161
Submitting a PKI certificate request ···························································································································· 161
Submitting a certificate request in auto mode ·································································································· 162
Submitting a certificate request in manual mode ····························································································· 162
Retrieving a certificate manually ································································································································ 163
Configuration guidelines ···································································································································· 163
Configuration procedure ···································································································································· 164
Configuring PKI certificate verification ······················································································································ 164
Configuration guidelines ···································································································································· 164
Configuring CRL-checking-enabled PKI certificate verification ······································································· 164