Setting LLDP Operating Mode ...................................................................................................... 72-7
Setting the LLDP Re-Initialization Delay ....................................................................................... 72-7
Enabling LLDP Polling................................................................................................................... 72-8
Configuring the TLVs to Be Advertised ......................................................................................... 72-8
Configuring the Management Address.......................................................................................... 72-8
Setting Other LLDP Parameters.................................................................................................... 72-9
Setting an Encapsulation Format for LLDPDUs .......................................................................... 72-10
Configuring CDP Compatibility ........................................................................................................... 72-10
Configuration Prerequisites ......................................................................................................... 72-11
Configuring CDP Compatibility .................................................................................................... 72-11
Configuring LLDP Trapping ................................................................................................................ 72-11
Displaying and Maintaining LLDP ....................................................................................................... 72-12
LLDP Configuration Examples............................................................................................................ 72-12
Basic LLDP Configuration Example ............................................................................................ 72-12
CDP-Compatible LLDP Configuration Example.......................................................................... 72-15
73
PKI Configuration................................................................................................................................... 73-1
Introduction to PKI................................................................................................................................. 73-1
PKI Overview................................................................................................................................. 73-1
PKI Terms...................................................................................................................................... 73-1
Architecture of PKI......................................................................................................................... 73-2
Applications of PKI ........................................................................................................................ 73-3
Operation of PKI ............................................................................................................................ 73-3
PKI Configuration Task List ................................................................................................................... 73-4
Configuring an Entity DN ...................................................................................................................... 73-4
Configuring a PKI Domain .................................................................................................................... 73-6
Submitting a PKI Certificate Request.................................................................................................... 73-7
Submitting a Certificate Request in Auto Mode ............................................................................ 73-7
Submitting a Certificate Request in Manual Mode ........................................................................ 73-8
Retrieving a Certificate Manually .......................................................................................................... 73-9
Configuring PKI Certificate Verification ............................................................................................... 73-10
Destroying a Local RSA Key Pair ....................................................................................................... 73-11
Deleting a Certificate........................................................................................................................... 73-11
Configuring an Access Control Policy ................................................................................................. 73-12
Displaying and Maintaining PKI .......................................................................................................... 73-12
PKI Configuration Examples ............................................................................................................... 73-13
Requesting a Certificate from a CA Running RSA Keon ............................................................ 73-13
Requesting a Certificate from a CA Running Windows 2003 Server.......................................... 73-16
Troubleshooting PKI............................................................................................................................ 73-19
Failed to Retrieve a CA Certificate .............................................................................................. 73-19
Failed to Request a Local Certificate .......................................................................................... 73-20
Failed to Retrieve CRLs .............................................................................................................. 73-20
74
SSL Configuration.................................................................................................................................. 74-1
SSL Overview ....................................................................................................................................... 74-1
SSL Security Mechanism .............................................................................................................. 74-1
SSL Protocol Stack........................................................................................................................ 74-2
SSL Configuration Task List ................................................................................................................. 74-2
Configuring an SSL Server Policy......................................................................................................... 74-2
xxiv