Setting LLDP Operating Mode ...................................................................................................... 72-7Setting the LLDP Re-Initialization Delay ....................................................................................... 72-7Enabling LLDP Polling................................................................................................................... 72-8Configuring the TLVs to Be Advertised ......................................................................................... 72-8Configuring the Management Address.......................................................................................... 72-8Setting Other LLDP Parameters.................................................................................................... 72-9Setting an Encapsulation Format for LLDPDUs.......................................................................... 72-10Configuring CDP Compatibility ........................................................................................................... 72-10Configuration Prerequisites ......................................................................................................... 72-11Configuring CDP Compatibility.................................................................................................... 72-11Configuring LLDP Trapping ................................................................................................................ 72-11Displaying and Maintaining LLDP ....................................................................................................... 72-12LLDP Configuration Examples............................................................................................................ 72-12Basic LLDP Configuration Example ............................................................................................ 72-12CDP-Compatible LLDP Configuration Example.......................................................................... 72-1573 PKI Configuration................................................................................................................................... 73-1Introduction to PKI................................................................................................................................. 73-1PKI Overview................................................................................................................................. 73-1PKI Terms...................................................................................................................................... 73-1Architecture of PKI......................................................................................................................... 73-2Applications of PKI ........................................................................................................................ 73-3Operation of PKI ............................................................................................................................ 73-3PKI Configuration Task List ................................................................................................................... 73-4Configuring an Entity DN ...................................................................................................................... 73-4Configuring a PKI Domain .................................................................................................................... 73-6Submitting a PKI Certificate Request.................................................................................................... 73-7Submitting a Certificate Request in Auto Mode ............................................................................ 73-7Submitting a Certificate Request in Manual Mode ........................................................................ 73-8Retrieving a Certificate Manually .......................................................................................................... 73-9Configuring PKI Certificate Verification ............................................................................................... 73-10Destroying a Local RSA Key Pair ....................................................................................................... 73-11Deleting a Certificate........................................................................................................................... 73-11Configuring an Access Control Policy ................................................................................................. 73-12Displaying and Maintaining PKI .......................................................................................................... 73-12PKI Configuration Examples ............................................................................................................... 73-13Requesting a Certificate from a CA Running RSA Keon ............................................................ 73-13Requesting a Certificate from a CA Running Windows 2003 Server.......................................... 73-16Troubleshooting PKI............................................................................................................................ 73-19Failed to Retrieve a CA Certificate .............................................................................................. 73-19Failed to Request a Local Certificate .......................................................................................... 73-20Failed to Retrieve CRLs .............................................................................................................. 73-2074 SSL Configuration.................................................................................................................................. 74-1SSL Overview ....................................................................................................................................... 74-1SSL Security Mechanism .............................................................................................................. 74-1SSL Protocol Stack........................................................................................................................ 74-2SSL Configuration Task List ................................................................................................................. 74-2Configuring an SSL Server Policy......................................................................................................... 74-2xxiv