22
C
HAPTER
2: F
EATURE
D
ESCRIPTION
PKI PKI
Configuration
PKI Commands
Public key infrastructure (PKI) is a system
which uses public key technology and digital
certificate to protect system security and
authenticate digital certificate users.
■
Generating an RSA pair for PKI
■
Configuring PKI certificate registration
■
Submitting a PKI certificate request
■
Configuring PKI certificate validation
■
Configuring access control policy of
certificate attribute
PORTAL Portal
Configuration
Portal Commands
Portal authentication
■
Portal authentication basic configuration
■
Portal authentication advanced
configuration
Rsh Rsh
Configuration
Rsh Commands
Users can use the Rsh command to execute
commands on the host of the client end.
■
Rsh configuration
ACL ACL
Configuration
ACL Commands
Access control list, to implement traffic
identification function
Traffic template is not supported.
■
Time-Based ACL
■
Basic IPv4 ACL configuration
■
Advanced IPv4 ACL configuration
■
Ethernet frame header ACL
configuration
■
User-defined ACL configuration
■
Basic IPv6 ACL configuration
■
Advanced IPv6 ACL configuration
IPSec IPSec
Configuration
IPSec Commands
Layer 3 tunnel encryption protocol defined
by IETF, which provides security for IP data
packets transmitted on the Internet.
■
Configuring an IPSec proposal
■
Configuring an IPSec policy
■
Configuring an IPSec policy template
■
Applying an IPSec policy
■
Configuring an encryption card IPSec
policy
■
Configuring encryption switch fabric
■
Configuring fast forwarding for
encryption card
■
Configuring an IKE proposal
■
Configuring an IKE peer
■
Configuring IKE keepalive timer
Table 9
Features in security volume
Feature
Operation and command
manual Feature
description
Summary of Contents for MSR 20-20
Page 4: ......
Page 8: ...8 CHAPTER 1 INTRODUCTION...
Page 28: ...28 CHAPTER 2 FEATURE DESCRIPTION...
Page 34: ...34 CHAPTER 3 LOGGING ONTO MSR SERIES ROUTERS...