Nortel Networks 2300 manual Managing Keys and Certificates

Models: 2300

1 658
Download 658 pages 6.46 Kb
Page 21
Image 21

Contents 21

Mapping Security ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Mapping User-Based Security ACLs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Mapping Security ACLs to Ports, VLANs, Virtual Ports, or Distributed APs . 368 Modifying a Security ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Adding Another ACE to a Security ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Placing One ACE before Another . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371 Modifying an Existing Security ACL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Clearing Security ACLs from the Edit Buffer . . . . . . . . . . . . . . . . . . . . . . . . . 373 Using ACLs to Change CoS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 Filtering Based on DSCP Values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 Enabling Prioritization for Legacy Voice over IP . . . . . . . . . . . . . . . . . . . . . . . . . 376 Enabling SVP Optimization for SpectraLink Phones . . . . . . . . . . . . . . . . . . . 377 Security ACL Configuration Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377

Managing Keys and Certificates 379

Why Use Keys and Certificates? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Wireless Security through TLS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 PEAP-MS-CHAP-V2 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 About Keys and Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Public Key Infrastructures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Public and Private Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383 Digital Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 PKCS #7, PKCS #10, and PKCS #12 Object Files . . . . . . . . . . . . . . . . . . . . 385 Creating Keys and Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Choosing the Appropriate Certificate Installation Method for Your Network . 387 Creating Public-Private Key Pairs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Generating Self-Signed Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 Installing a Key Pair and Certificate from a PKCS #12 Object File . . . . . . . . 390 Creating a CSR and Installing a Certificate from a PKCS #7 Object File . . . 391 Installing a CA’s Own Certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392 Displaying Certificate and Key Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Key and Certificate Configuration Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . 393 Creating Self-Signed Certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Installing CA-Signed Certificates from PKCS #12 Object Files . . . . . . . . . . . 397

Installing CA-Signed Certificates Using a PKCS #10 Object File (CSR)

and a PKCS #7 Object File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399

Nortel WLAN Security Switch 2300 Series Configuration Guide

Page 21
Image 21
Nortel Networks 2300 manual Managing Keys and Certificates