D-Link DWS-1008 Informations techniques Page 290

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 406
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 289
289
DWS-1008 CLI Reference Guide
D-Link Systems, Inc.
Cryptography Commands
Use cryptography commands to configure and manage certificates and public-private key
pairs for system authentication. Depending on your network configuration, you must create
keys and certificates to authenticate the switch to IEEE 802.1X wireless clients for which the
switch performs authentication.
crypto ca-certificate
Installs a certificate authority’s own PKCS #7 certificate into the DWS-1008 switch certificate
and key storage area.
Syntax: crypto ca-certificate {eap}
PEM-formatted-certificate
eap Stores the certificate authority’s certificate that signed the Extensible
Authentication Protocol (EAP) certificate for the switch.
The EAP certificate authenticates the to 802.1X supplicants (clients).
PEM-formatted- ASCII text representation of the certificate authority PKCS #7
certificate, certificate consisting of up to 4096 characters that you have
obtained from the certificate authority.
Defaults: None Access: Enabled
Usage: The Privacy-Enhanced Mail protocol (PEM) format is used for representing a PKCS
#7 certificate in ASCII text. PEM uses base64 encoding to convert the certificate to
ASCII text, then puts the encoded text between the following delimiters:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
To use this command, you must already have obtained a copy of the certificate authority’s
certificate as a PKCS #7 object file. Then do the following:
1. Open the PKCS #7 object file with an ASCII text editor such as Notepad or vi.
2. Enter the crypto ca-certificate command on the CLI command line.
Cryptography Commands
Vue de la page 289
1 2 ... 285 286 287 288 289 290 291 292 293 294 295 ... 405 406

Commentaires sur ces manuels

Pas de commentaire