Manual
Table Of Contents
- Table of Contents
- List of Figures
- Preface
- Chapter 1
- Overview
- Section I
- Basic Operations
- Chapter 2
- Starting a Local or Telnet Management Session
- Chapter 3
- Enhanced Stacking
- Chapter 4
- Basic Switch Parameters
- When Does a Switch Need an IP Address?
- Configuring an IP Address and Switch Name
- Activating the BOOTP and DHCP Client Software
- Rebooting a Switch
- Configuring the Manager and Operator Passwords
- Setting the System Time
- Configuring the Console Startup Mode
- Configuring the Console Timer
- Enabling or Disabling the Telnet Server
- Setting the Baud Rate of the RS-232 Terminal Port
- Pinging a Remote System
- Returning the AT-S62 Software to the Factory Default Values
- Viewing System Hardware and Software Information
- Setting the Switch’s Temperature Threshold
- Chapter 5
- SNMPv1 and SNMPv2c Configuration
- Chapter 6
- Port Parameters
- Chapter 7
- MAC Address Table
- Chapter 8
- Port Trunking
- Chapter 9
- Port Mirroring
- Chapter 10
- Ethernet Statistics
- Section II
- Advanced Operations
- Chapter 11
- File System
- Chapter 12
- File Downloads and Uploads
- Chapter 13
- Event Log
- Chapter 14
- Quality of Service
- Chapter 15
- IGMP Snooping
- Chapter 16
- Denial of Service Defense
- Section III
- SNMPv3 Operations
- Chapter 17
- SNMPv3 Configuration
- SNMPv3 Overview
- Configuring the SNMPv3 Protocol
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Table Menus
- Displaying the Display SNMPv3 User Table Menu
- Displaying the Display SNMPv3 View Table Menu
- Displaying the Display SNMPv3 Access Table Menu
- Displaying the Display SNMPv3 SecurityToGroup Table Menu
- Displaying the Display SNMPv3 Notify Table Menu
- Displaying the Display SNMPv3 Target Address Table Menu
- Displaying the Display SNMPv3 Target Parameters Table Menu
- Displaying the Display SNMPv3 Community Table Menu
- Section IV
- Spanning Tree Protocols
- Chapter 18
- Spanning Tree and Rapid Spanning Tree Protocols
- Chapter 19
- Multiple Spanning Tree Protocol
- Section V
- Virtual LANs
- Chapter 20
- Tagged and Port-based Virtual LANs
- VLAN Overview
- Port-based VLAN Overview
- Tagged VLAN Overview
- Creating a Port-based or Tagged VLAN
- Example of Creating a Port-based VLAN
- Example of Creating a Tagged VLAN
- Modifying a VLAN
- Displaying VLANs
- Deleting a VLAN
- Deleting All VLANs
- Displaying PVIDs and Port Priorities
- Enabling or Disabling Ingress Filtering
- Specifying a Management VLAN
- Chapter 21
- GARP VLAN Registration Protocol
- Chapter 22
- Multiple VLAN Modes
- Section VI
- Port Security
- Section VII
- Management Security
- Chapter 25
- Web Server
- Chapter 26
- Encryption Keys
- Chapter 27
- Public Key Infrastructure Certificates
- Chapter 28
- Secure Shell (SSH) Protocol
- Chapter 29
- RADIUS and TACACS+ Authentication Protocols
- Chapter 30
- Management Access Control List
- Section VIII
- Web Browser Management
- Chapter 31
- Starting a Web Browser Management Session
- Chapter 32
- Enhanced Stacking
- Chapter 33
- Basic Switch Parameters
- Chapter 34
- SNMPv1 and SNMPv2c Community Strings
- Chapter 35
- Port Parameters
- Chapter 36
- MAC Address Table
- Chapter 37
- Port Trunking
- Chapter 38
- Port Mirroring
- Chapter 39
- File Downloads and Uploads
- Chapter 40
- Event Log
- Chapter 41
- Quality of Service
- Chapter 42
- IGMP Snooping
- Chapter 43
- Denial of Service Defense
- Chapter 44
- SNMPv3 Protocol
- Configuring the SNMPv3 Protocol
- Enabling the SNMP Protocol
- Configuring the SNMPv3 User Table
- Configuring the SNMPv3 View Table
- Configuring the SNMPv3 Access Table
- Configuring the SNMPv3 SecurityToGroup Table
- Configuring the SNMPv3 Notify Table
- Configuring the SNMPv3 Target Address Table
- Configuring the SNMPv3 Target Parameters Table
- Configuring the SNMPv3 Community Table
- Displaying SNMPv3 Tables
- Chapter 45
- STP, RSTP, and MSTP
- Chapter 46
- Virtual LANs
- Chapter 47
- GARP VLAN Registration Protocol
- Chapter 48
- MAC Address Security
- Chapter 49
- 802.1x Port-based Access Control
- Chapter 50
- Secure Shell Protocol
- Chapter 51
- Encryption Keys, PKI, and SSL
- Chapter 52
- RADIUS and TACACS+ Authentication Protocols
- Chapter 53
- Management Access Control List
- Appendix A
- AT-S62 Default Settings
- Basic Switch Default Settings
- Enhanced Stacking Default Setting
- SNMP Default Settings
- Port Configuration Default Settings
- Event Log Default Settings
- Quality of Service
- IGMP Snooping Default Settings
- Denial of Service Prevention Default Settings
- STP, RSTP, and MSTP Default Settings
- VLAN Default Settings
- GVRP Default Settings
- MAC Address Security Default Settings
- 802.1x Port-Based Network Access Control Default Settings
- Web Server Default Settings
- SSL Default Settings
- PKI Default Settings
- SSH Default Settings
- Server-Based Authentication Default Settings
- Management Access Control List Default Setting
- AT-S62 Default Settings
- Appendix B
- Index

Chapter 27: Public Key Infrastructure Certificates
Section VII: Management Security 526
The Certificate Database portion of the window lists the
certificates currently in the database. These could be certificates
that you created or had a CA create. The switch’s web server can
only use a certificate if it is in the database.
Note
In the X509 Certificate Management Menu, MTrust means manually
trusted. This field indicates that you verified the certificate. The
Source field indicates the certificate was generated on the switch.
5. Type 1 to select Create Self-Signed Certificate.
The Create Self-Signed Certificate menu is shown in Figure 171.
Figure 171 Create Self-Signed Certificate Menu
6. Type 1 to select Certificate Name to enter a filename for the
certificate.
The following message is displayed:
Enter certificate name (24 chars max) ->
7. Enter a filename for the certificate. This is the filename under which
the certificate will be stored as in the AT-S62 file system. The name
can be up to 24 alphanumeric characters. Spaces are allowed.
Note
The management software automatically adds a “.cer” extension to
the filename.
8. Type 2 to select Key Pair ID.
The following message is displayed:
Enter certificate Key Pair ID -> [0 to 65535] ->
Allied Telesyn Ethernet Switch AT-8524M - ATS62
Production Switch
User: Manager 11:20:02 02-Jan-2004
Create Self-Signed Certificate
1 - Certificate Name.............
2 - Key Pair ID.................. 0
3 - Format....................... DER
4 - Serial Number................ 0
5 - Subject DN...................
6 - Create Self-Signed Certificate
R - Return to Previous Menu
Enter your selection?