74
SSL Configuration
Wh n configuring SSL, go to thes
e
e sections for information you are interested in:
z
SSL Overview
z
SSL Configuration Task List
Displaying and Maintaining SSL
z
ting SSL
z
Troubleshoo
SSL
ecure connection service for TCP-based
application layer protocols, for example, HTTP protocol. It is widely used in E-business and online bank
ta transmission over the Internet.
SSL S
SSL
z
lity: SSL uses a symmetric encryption algorithm to encrypt data and uses the Rivest,
z
ing
z
Overview
Secure Sockets Layer (SSL) is a security protocol providing s
fields to provide secure da
ecurity Mechanism
provides these security services:
Confidentia
Shamir, and Adelman (RSA) algorithm to encrypt the key to be used by the symmetric encryption
algorithm.
Authentication: SSL supports certificate-based authentication of the server and the client by us
the digital signatures, with the authentication of the client being optional. The SSL server and client
obtain certificates from a certificate authority (CA) through the Public Key Infrastructure (PKI).
Reliability: SSL uses the key-based message authentication code (MAC) to verify message
integrity. A MAC algorithm transforms a message of any length to a fixed-length message.
Figure
74-1
illustrates how SSL uses a MAC algorithm to verify message integrity. With the key, the
sender uses the MAC algorithm to compute the MAC value of a message. Then, the sender
suffixes the MAC value to the message and sends the result to the receiver. The receiver uses the
same key and MAC algorithm to compute the MAC value of the received message, and compares
the locally computed MAC value with that received. If the two matches, the receiver considers the
message tampered and discards the
message.
message intact; otherwise, the receiver considers the
Figure 74-1
Message integrity verification by a MAC algorithm
74-1