EasyManua.ls Logo

Motorola WiNG 5.6 - Certificates; Trustpoints

Motorola WiNG 5.6
1048 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
13 - 126 WiNG 5.6 Access Point System Reference Guide
5. Review the following VPN peer security association statistics:
13.3.25 Certificates
Access Point Statistics
The Secure Socket Layer (SSL) protocol ensures secure transactions between Web servers and browsers. SSL uses a third-party
certificate authority to identify one (or both) ends of a transaction. A browser checks the certificate issued by the server before
establishing a connection.
This screen is partitioned into the following:
Trustpoints
RSA Keys
13.3.25.1 Trustpoints
Certificates
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate authority, corporate
or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration parameters
and an association with an enrolled identity certificate.
1. Select the Statistics menu from the Web UI.
2. Select System from the navigation pane (on the left-hand side of the screen). Expand a RF Domain and select one of its
connected access points
3. Select Certificates and expand the menu to reveal its sub menu items.
4. Select Trustpoints.
Peer Lists IP addresses for peers sharing security associations (SAs) for tunnel interoperability.
When a peer sees a sensitive packet, it creates a secure tunnel and sends the packet through
the tunnel to its destination.
Local IP Address Displays each listed peer’s local tunnel end point IP address. This address represents an
alternative to an interface IP address.
Protocol Lists the security protocol used with the VPN IPSec tunnel connection. SAs are unidirectional,
existing in each direction and established per security protocol. Options include ESP and AH.
State Lists the state of each listed peer’s security association.
SPI In Lists stateful packet inspection (SPI) status for incoming IPSec tunnel packets. SPI tracks each
connection traversing the IPSec VPN tunnel and ensures they are valid.
SPI Out Lists SPI status for outgoing IPSec tunnel packets. SPI tracks each connection traversing the
IPSec VPN tunnel and ensures they are valid.
Mode Displays the IKE mode as either Main or Aggressive. IPSEC has two modes in IKEv1 for key
exchanges. Aggressive mode requires 3 messages be exchanged between the IPSEC peers to
setup the SA, Main requires 6 messages.
Clear All Select the Clear All button to clear each peer of its current status and begin a new data
collection.
Refresh
Select the Refresh button to update the screen’s statistics counters to their latest values.

Table of Contents

Related product manuals