Certificate Attribute Access Control Policy Configuration Example - HP 3600 v2 Series Configuration Manual

Hide thumbs Also See for 3600 v2 Series:
Table of Contents

Advertisement

Signature Algorithm: sha1WithRSAEncryption
81029589 7BFA1CBD 20023136 B068840B
(Omitted)
You can also use some other display commands to display more information about the CA certificate. For
more information about the display pki certificate ca domain command, see Security Command
Reference.
Certificate attribute access control policy configuration
example
Network requirements
The client accesses the remote HTTP Secure (HTTPS) server through the HTTPS protocol.
Configure SSL to make sure that only legal clients log into the HTTPS server, and create a certificate
attribute access control policy to control access to the HTTPS server.
Figure 82 Network diagram
Configuration procedure
The configuration procedure involves SSL configuration and HTTPS configuration. For more information
about SSL configuration, see
Fundamentals Configuration Guide.
The PKI domain to be referenced by the SSL policy must exist. For how to configure a PKI domain, see
"Configure the PKI
The configuration procedure is as follows:
1.
Configure the HTTPS server:
# Configure the SSL policy for the HTTPS server to use.
<Device> system-view
[Device] ssl server-policy myssl
[Device-ssl-server-policy-myssl] pki-domain 1
[Device-ssl-server-policy-myssl] client-verify enable
[Device-ssl-server-policy-myssl] quit
2.
Configure the certificate attribute group:
CA Issuers - URI:http://l00192b/CertEnroll/l00192b_CA%20server.crt
CA Issuers - URI:file://\\l00192b\CertEnroll\l00192b_CA server.crt
1.3.6.1.4.1.311.20.2:
.0.I.P.S.E.C.I.n.t.e.r.m.e.d.i.a.t.e.O.f.f.l.i.n.e
"Configuring
domain:."
SSL." For more information about HTTPS configuration, see
266

Advertisement

Table of Contents
loading

Table of Contents