Extron IPL EXP S5 handleiding

49 pagina's
PDF beschikbaar

Handleiding

Je bekijkt pagina 45 van 49
IPL EXP I/O Series • Reference Information 37
Secure Sockets Layer (SSL) Certificates
Extron control processors and expansion interfaces ship with factory-installed SSL certicates created by
Extron. If you want or are required to use a di󰀨erent SSL certicate at your installation site, then you can use
system utilities in the Toolbelt software to change the SSL certicate at any time. The Toolbelt Help File provides
instructions on how to apply an SSL certicate to a control processor.
NOTES:
You must run Toolbelt as an administrator.
Some certificates require a passphrase that is created when the certificate is created. If a passphrase is
required, you must enter that passphrase before uploading and applying the certificate.
Control system expansion interfaces and controllers support standard OpenSSL certicate encodings such as
.pem (Privacy-enhanced Electronic Mail) and .der (Distinguished Encoding Rules) le types. PEM le types are
ASCII encoded and are the required format for uploading to the control processor. DER le types are binary
encoded and can typically have several le extension variations, such as .crt and .cer. There are many standard
tools that can convert from DER to PEM le encodings if needed.
NOTE: A DER format file must be converted to PEM encoding before uploading it to the control processor.
To properly create the certicate for uploading to Extron expansion interfaces and control processors, ensure that
the certicate le meets the following requirements:
Contains X.509 certificate information
Contains public and private keys
Uses PEM encoding
NOTE: ITU-T standard X.509 covers aspects of public key encryption, digital cryptography, certificates, and
validation.
Contact your IT administrator for more information on what tools and policies are required to obtain or create the
SSL certicate and, if necessary, the corresponding passphrase.
IEEE 802.1X Certificates
IEEE 802.1X is a standard that enables port-based network access control via an authentication server. The
protocol requires that all devices must be authenticated before gaining privileges to access the secure part of the
network.
The Extron implementation of 802.1X supports PEAP - MSCHAPV2 and EAP - TLS methods of authentication.
This section of the guide details the requirements for any certicate le (machine or CA) and the private key le
(for the machine certicate) to be used in the system.
Extron provides resources for learning about 802.1X implementation:
The Extron 802.1X Technology Reference Guide, available from www.extron.com, is the primary resource
for background information, system planning, topology, and how to set up these systems.
The Toolbelt Help file provides detailed step-by-step information on using the software to set up 802.1X for
IP Link Pro control systems and on troubleshooting.
The 802.1X Primer white paper, also available from www.extron.com, provides a general overview of the
protocol and its use within a control system.
NOTES:
You must run Toolbelt as an administrator.
Machine certificates require a private key file, which can be encrypted.
05/2019: Carolina wants to omit the following material:
It covers the following topics:
Introduction to and overview of 802.1X protocol, its features, and
implementation
Supported products
System topology
Prerequisites and requirements for certificates, private keys, and passwords
and supported authentication protocols
Overall configuration procedure
Troubleshooting procedure

Bekijk gratis de handleiding van Extron IPL EXP S5, stel vragen en lees de antwoorden op veelvoorkomende problemen, of gebruik onze assistent om sneller informatie in de handleiding te vinden of uitleg te krijgen over specifieke functies.

Productinformatie

MerkExtron
ModelIPL EXP S5
CategorieNiet gecategoriseerd
TaalNederlands
Grootte7534 MB