vEstablishing a Connection to the SFTP Server···············································································9-2Working with the SFTP Directories ·································································································9-3Working with SFTP Files ·················································································································9-4Displaying Help Information ············································································································9-4Terminating the Connection to the Remote SFTP Server·······························································9-5SFTP Client Configuration Example ·······································································································9-5SFTP Server Configuration Example······································································································9-910 PKI Configuration ··································································································································10-1Introduction to PKI·································································································································10-1PKI Overview·································································································································10-1PKI Terms······································································································································10-1Architecture of PKI·························································································································10-2Applications of PKI ························································································································10-3Operation of PKI ····························································································································10-3PKI Configuration Task List ··················································································································10-4Configuring an Entity DN ······················································································································10-4Configuring a PKI Domain ····················································································································10-6Submitting a PKI Certificate Request····································································································10-7Submitting a Certificate Request in Auto Mode ············································································10-8Submitting a Certificate Request in Manual Mode ········································································10-8Retrieving a Certificate Manually ··········································································································10-9Configuring PKI Certificate Verification·······························································································10-10Destroying a Local RSA Key Pair ·······································································································10-11Deleting a Certificate···························································································································10-11Configuring an Access Control Policy·································································································10-12Displaying and Maintaining PKI ··········································································································10-12PKI Configuration Examples ···············································································································10-13Requesting a Certificate from a CA Running RSA Keon ····························································10-13Requesting a Certificate from a CA Running Windows 2003 Server··········································10-16Configuring a Certificate Attribute-Based Access Control Policy················································10-20Troubleshooting PKI····························································································································10-21Failed to Retrieve a CA Certificate ······························································································10-21Failed to Request a Local Certificate ··························································································10-22Failed to Retrieve CRLs ··············································································································10-2211 SSL Configuration ·································································································································11-1SSL Overview ·······································································································································11-1SSL Security Mechanism ··············································································································11-1SSL Protocol Stack························································································································11-2SSL Configuration Task List ·················································································································11-2Configuring an SSL Server Policy·········································································································11-3Configuration Prerequisites ···········································································································11-3Configuration Procedure················································································································11-3SSL Server Policy Configuration Example ····················································································11-4Configuring an SSL Client Policy ··········································································································11-5Configuration Prerequisites ···········································································································11-6Configuration Procedure················································································································11-6Displaying and Maintaining SSL ···········································································································11-6