Coyote Point Systems Equalizer Especificaciones Pagina 297

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 594
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 296
3. PFX - PFX format files are also in PKCS #12 format, however, with additional Microsoft specifics. These
files usually have a ".pfx" extension with the file name.
Currently, PEM-format certificates and keys must be uploaded separately in the CLI using the certfile and keyfile
parameters in the certificate context or as shown below in the GUI.
PKCS #12 and PFX format files usually contain both the certificate and the associated key. You can upload this
file once as either the certfile or the keyfile in the GUI. The GUI will separate the keyfile and the certfile behind the
scenes and store them appropriately. You can also upload the same file as both the certfile and the keyfile.
Use the Security > Certificate tab to select a default SSL certificate that clients will use to validate a connection
to an HTTPS cluster (a cluster certificate).
Default Certificate
Use the drop down list to select a default SSL certificate that clients will use
to validate a connection to this HTTPS cluster.
Client CA
Use the drop down list to select the name of a client certificate authority
(CA).This is an authority in a network that issues and manages security
credentials and public keys for message encryption. It must be uploaded to
Equalizer's certificated store. As part of a public key infrastructure, a CA
checks with a registration authority to verify information provided by the
requester of a digital certificate. If the registration authority verifies the
requester's information, the CA can then issue a certificate. The certificate
usually includes the owner's public key, the expiration date of the
certificate, the owner's name, and other information about the public key
owner.
CRL
Certificate Revocation Lists (CRL) can be used to verify that the certificates
used by Equalizer are valid and have not been compromised. A CRL must
have been uploaded to Equalizer and then associated with one or more
clusters in the cluster specific context. Whenever a certificate is used to
authenticate a connection to the cluster, the CRL is checked to make sure
the certificate being used has not been revoked. Use the drop down list to
select a CRL.
Validation Depth
The depth to which certificate checking is done on the client certificate
Copyright © 2013 Coyote Point Systems. A subsidiary of Fortinet, Inc.
All Rights Reserved.
297
Equalizer Administration Guide
Vista de pagina 296
1 2 ... 292 293 294 295 296 297 298 299 300 301 302 ... 593 594

Comentarios a estos manuales

Sin comentarios