Raritan Computer KSX II Switch User Manual


 
Chapter 9: Security Management
201
3. You are prompted to confirm the deletion. Click OK.
SSL Certificates
The KSX II uses the Secure Socket Layer (SSL) protocol for any
encrypted network traffic between itself and a connected client. When
establishing a connection, the KSX II has to identify itself to a client using
a cryptographic certificate.
It is possible to generate a Certificate Signing Request (CSR) and install
a certificate signed by the Certificate Authority (CA) on the KSX II. The
CA verifies the identity of the originator of the CSR. The CA then returns
a certificate containing its signature to the originator. The certificate,
bearing the signature of the well-known CA, is used to vouch for the
identity of the presenter of the certificate.
To create and install a SSL certificate:
1. Select Security > SSL Certificate.
2. Complete the following fields:
a. Common name - The network name of the KSX II once it is
installed in the user's network (usually the fully qualified domain
name). It is identical to the name that is used to access the KSX
II with a web browser but without the prefix “http://”. In case the
name given here and the actual network name differ, the
browser will pop up a security warning when the KSX II is
accessed using HTTPS.