Raritan Computer DKX2-V2.3.5-0N-E Switch User Manual


 
Chapter 9: Security Management
207
3. You are prompted to confirm the deletion. Click OK.
SSL Certificates
The KX II uses the Secure Socket Layer (SSL) protocol for any
encrypted network traffic between itself and a connected client. When
establishing a connection, the KX II has to identify itself to a client using
a cryptographic certificate.
It is possible to generate a Certificate Signing Request (CSR) and install
a certificate signed by the Certificate Authority (CA) on the KX II. The CA
verifies the identity of the originator of the CSR. The CA then returns a
certificate containing its signature to the originator. The certificate,
bearing the signature of the well-known CA, is used to vouch for the
identity of the presenter of the certificate.
To create and install a SSL certificate:
1. Select Security > SSL Certificate.
2. Complete the following fields:
a. Common name - The network name of the KX II once it is
installed in the user's network (usually the fully qualified domain
name). It is identical to the name that is used to access the KX II
with a web browser but without the prefix “http://”. In case the
name given here and the actual network name differ, the
browser will pop up a security warning when the KX II is
accessed using HTTPS.