HP (Hewlett-Packard) 2650 (J4899A/B) ユーザーズマニュアル

ページ / 306
7-9
Configuring Secure Socket Layer (SSL)
Configuring the Switch for SSL Operation
2. Generate the Switch’s Server Host Certificate 
You must generate a server certificate on the switch before enabling SSL. The 
switch uses this server certificate, along with a dynamically generated session 
key pair to negotiate an encryption method and session with a browser trying 
to connect via SSL to the switch. (The session key pair mentioned above is 
not visible on the switch. It is a temporary, internally generated pair used for 
a particular switch/client session, and then discarded.) 
The server certificate is stored in the switch’s flash memory. The server 
certificate should be added to your certificate folder on the SSL clients who 
you want to have access to the switch. Most browser applications automati-
cally add the switch’s host certificate to there certificate folder on the first 
use. This method does allow for a security breach on the first access to the 
switch. (Refer to the documentation for your browser application.)
There are two types of certificated that can be used for the switch’s host 
certificate. The first type is a self-signed certificate, which is generated and 
digitally signed by the switch. Since self-signed certificates are not signed by 
a third-party certificate authority, there is no audit trail to a root CA certificate 
and no fool-proof means of verifying authenticity of certificate. The second 
type is a certificate authority-signed certificate, which is digitally signed by a 
certificate authority, has an audit trail to a root CA certificate, and can be 
verified unequivocally
N o t e :
There is usually a fee associated with receiving a verified certificate and the 
valid dates are limited by the root certificate authority issuing the certificate.
When you generate a certificate key pair and/or certificate on the switch, the 
switch places the key pair and/or certificate in flash memory (and not in 
running config). Also, the switch maintains the certificate across reboots, 
including power cycles. You should consider this certificate to be “perma-
nent”; that is, avoid re-generating the certificate without a compelling reason. 
Otherwise, you will have to re-introduce the switch’s host certificate on all 
management stations you have set up for SSL access to the switch using the 
earlier certificate.
Removing (zeroizing) the switch's certificate key pair or certificate render the 
switch unable to engage in SSL operation and automatically disables SSL on 
the switch. (To verify whether SSL is enabled, execute 
show config.)