Dell Data Protection | Encryption Manuel d'utilisateur Page 34

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 80
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 33
34 Enterprise Server Installation and Migration Guide
9
Select the Setup type (without the Front End check box being selected) and click
Next
.
If the
Complete
option is selected, all program features are installed. Continue to step 11.
The
Custom
option selection allows installation of only those program features desired. Continue to step 10.
10
At the
Custom Setup
dialog, choose the features you want to install. For a description of each feature and what it is required
for, see Dell Component Descriptions.
Once the features are selected, click
Next
. Continue to step 11.
11
Verify that all fields are populated for each component. Leave the default port value as-is unless there is a conflict with an
existing port.
If the “Works with Front End....” box is selected, on the next dialog, you will enter the fully qualified domain name for the Dell
Security Server. If you have an external certificate that is being used with APNs, enter the fully qualified domain name
specified in the certificate. If the box is not selected, then the field is not available on the next dialog. Click
Next
.
12
For the Front End Security Server host name, this relates to the previous dialog’s “Works with Front End....” box. If the box
was selected on the previous dialog, enter the fully qualified domain name for the Dell Security Server. If you have an external
certificate that is being used with APNs, enter the fully qualified domain name specified in the certificate. If the box was not
selected, then the field is not available. Verify that all other fields are populated for component. Leave the default port value
as-is unless there is a conflict with an existing port. Click
Next
.
NOTE: The Message Broker Service does not allow the “_” (underscore) character in the fully qualified domain name.
13
In the Security Socket Layer and Host dialog, enter the fully qualified domain name of the back-end server and select the
correct Server edition,
Enterprise Edition
or
Virtual Edition
.
14
You have a choice of SSL types to use. Select option “a” or “b” below:
a
To use an existing certificate that was purchased from a CA authority, select the first option and click
Next
.
NOTE: To use this setting, the exported CA certificate being imported must have the full trust chain. If unsure,
re-export the CA certificate and ensure that the following options are selected in the “Certificate Export
Wizard”:
– Personal Information Exchange - PKCS#12 (.PFX)
– Include all certificates in the certification path if possible
– Export all extended properties
Click
Browse
to enter the path to the certificate.
Enter the password associated with this certificate. The key store file must be .p12 or pfx. See How to Export a Certificate
to .PFX Using the Certificate Management Console for instructions.
Click
Next
.
OR
b To create a self-signed certificate, select the second option and click Next.
At the
Set Up a Certificate Authority
dialog, enter the following information:
Fully qualified computer name (example: computername.domain.com)
Organizational Unit (example: Security)
Organization
City
State (full name)
Country: Two-letter country abbreviation
Click
Next
.
15
At the
Ready to Install the Program
dialog, click
Install
to begin installation.
16
When prompted, click
Finish
to complete the installation.
Do not reboot the server until Post-Installation Configuration tasks are complete. Rebooting now would cause the server
to attempt to start Dell Services, which would be unsuccessful at this point.
____
Vue de la page 33
1 2 ... 29 30 31 32 33 34 35 36 37 38 39 ... 79 80

Commentaires sur ces manuels

Pas de commentaire