User guide

Overview of Trust Configuration 79
Chapter 9
Managing Trusted Servers
This chapter describes trusted servers and the configuration tasks that pertain to
managing trust, trusted servers, certificates, and certificate authorities. Use this
feature to add, remove, and configure trusted network servers and to configure
certificate and identity information for the servers that might authenticate you
when you connect. Configuring this feature is required for protocols that implement
mutual authentication and is a recommended security measure. See “Validating a
Server Certificate—Mutual Authentication” on page 46.
You can configure trust for authentication servers if you use EAP-TTLS, EAP-TLS, or
EAP-PEAP authentication.
When EAP authentication occurs using any of these protocols, the authentication
server sends a server certificate to OAC. The certificate represents the server’s trust
credentials. OAC must trust the server certificate before it can continue
communicating with that server. If OAC does not trust the server, the
authentication process terminates.
Overview of Trust Configuration
Trust configuration is fundamental to secure network communication between you
and a network server. OAC gives you the tools to authenticate the server to which
you are connecting and to ensure that you are connecting to the intended server.
Authenticating server trust protects you from intrusion or hostile attacks from
anyone who might be pretending to represent that server.
This chapter describes how to perform the following trust-based tasks in OAC:
Add a trusted server.
Edit a trusted server.
Remove a trusted server.
Display the current trust tree hierarchy.
NOTE: Check with your network administrator before adding any trusted server or
changing any current trust configuration settings. Specifying incorrect settings can
prevent you from accessing your network.