No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Feature Description - Security 01

This is NE40E V800R010C10SPC500 Feature Description - Security
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
PKI System

PKI System

The PKI system is a universal secure infrastructure. It ensures information security by using the public key theory and technology. The PKI system, as an integration of software and hardware system and security policy, provides a set of security mechanisms. The PKI system provides a secure network environment where users can conveniently use encryption and digital signature technologies in various application scenarios, ensuring confidentiality, integrity, and validity of the data.

The PKI largely uses digital certificates for establishing mutual authentication and thereby securing communications. A certificate is used to authenticate the peers that attempt to set up an IPSec tunnel, and provides a centralized key management mechanism for IPSec. Certificates are issued by the third party CA, a certificate authorization center.

Certificates include root certificates and entity certificates:

  • A root certificate is also called a CA certificate. It proves that the corresponding local certificate is issued by a legitimate CA.
  • An entity certificate is also called a local certificate. It identifies a device in a CA domain, indicating that the device is authorized.

A certificate includes a certificate serial number, holder name, issuer name, valid period, public key, and digital signature of the issuer.

A PKI system comprises a terminal entity, certificate registration authority, CA, as shown in Table 17-1.
Table 17-1 Components of the PKI system

Component

Function

Terminal entity

Applicant and user of a certificate. The terminal entity can be an individual, an organization, a device (router/switch), or a process running in a PC.

Certificate registration authority (RA)

It receives users' certificate applications, authenticates users. In applications, the RA can work either independently or with the CA.

Certificate Authority (CA)

A third-party organization that issues and manages digital certificates. A CA is in charge of issuing certificates, specifying the validity periods of certificates, and issuing the CRL to revoke certificates when necessary.

Figure 17-2 shows the interaction among the components.

Figure 17-2 Schematic diagram of the PKI system
  1. For example, device A sends a certificate request to the CA. The request contains the entity information (describing end features) that the CA adopts to generate an entity certificate for device A.
  2. The CA authenticates the received device information, generates the certificate for device A, and saves the certificate to the PKI repository.

    NOTE:
    Two types of certificates are available, namely, the root certificate (CA certificate) and entity certificate. The root certificate represents the identity of the CA, whereas the entity certificate represents the identity of the device. In a CA domain, each certificate has a unique serial number for authenticating the validity or revocation state of the certificate.
  3. The CA issues the root certificate and entity certificate simultaneously to device A.
  4. Device A uses the root certificate to authenticate the validity of the entity certificate, that is, to verify that the entity certificate is issued by a legal CA, but not an attacker.
  5. Device B follows the same procedure as device A.
  6. If a device wants to use the certificate to prove its identity, for example, before the establishment of the IPSec VPN through IKE, the device can send its certificate to the peer.
Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055047

Views: 12815

Downloads: 31

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Share
Previous Next