EasyManua.ls Logo

Motorola WiNG 5.6 - Page 290

Motorola WiNG 5.6
1048 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
5 - 204 WiNG 5.6 Access Point System Reference Guide
9. Define the following configuration parameters to export a trustpoint:
10. Select OK to export the defined trustpoint. Select Cancel to revert the screen to its last saved configuration.
To optionally delete a trustpoint, select the Delete button from within the Certificate Management screen. Provide the
trustpoint name within the Delete Trustpoint screen and optionally select the Delete RSA Key option to remove the RSA
key along with the trustpoint. Select OK to proceed with the deletion, or Cancel to revert to the Certificate Management
screen.
5.4.2.1.1 RSA Key Management
Certificate Management
Refer to the RSA Keys screen to review existing RSA key configurations applied to managed devices. If an existing key does
not meet the needs of a pending certificate request, generate a new key or import or export an existing key to and from a remote
location.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s an algorithm that can be used for certificate
signing and encryption. When a device trustpoint is created, the RSA key is the private key used with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to and from remote locations:
Trustpoint Name Enter the 32 character maximum name assigned to the target trustpoint. The trustpoint
signing the certificate can be a certificate authority, corporation or individual.
URL Provide the complete URL to the location of the trustpoint. If needed, select Advanced to
expand the dialog to display network address information to the location of the target
trustpoint. The number of additional fields that populate the screen is dependent on the
selected protocol.
Protocol Select the protocol used for exporting the target trustpoint. Available options include:
tftp
ftp
sftp
http
•cf
•usb1
•usb2
•usb3
•usb4
Port If using Advanced settings, use the spinner control to set the port. This option is not valid
for cf, usb1, usb2, usb3 and usb4.
IP Address If using Advanced settings, enter IP address of the server used to export the trustpoint.
This option is not valid for cf, usb1, usb2, usb3 and usb4.
Host If using Advanced settings, provide the hostname of the server used to export the
trustpoint. This option is not valid for cf, usb1, usb2, usb3 and usb4.
Username/Password These fields are enabled if using ftp or sftp protocols,. Specify the username and the
password for that username to access the remote servers using these protocols.
Path/File If using Advanced settings, specify the path to the trustpoint. Enter the complete relative
path to the file on the server.

Table of Contents

Related product manuals