289
DWS-1008 CLI Reference Guide
D-Link Systems, Inc.
Cryptography Commands
Use cryptography commands to configure and manage certificates and public-private key
pairs for system authentication. Depending on your network configuration, you must create
keys and certificates to authenticate the switch to IEEE 802.1X wireless clients for which the
switch performs authentication.
crypto ca-certificate
Installs a certificate authority’s own PKCS #7 certificate into the DWS-1008 switch certificate
and key storage area.
Syntax: crypto ca-certificate {eap}
PEM-formatted-certificate
eap Stores the certificate authority’s certificate that signed the Extensible
Authentication Protocol (EAP) certificate for the switch.
The EAP certificate authenticates the to 802.1X supplicants (clients).
PEM-formatted- ASCII text representation of the certificate authority PKCS #7
certificate, certificate consisting of up to 4096 characters that you have
obtained from the certificate authority.
Defaults: None Access: Enabled
Usage: The Privacy-Enhanced Mail protocol (PEM) format is used for representing a PKCS
#7 certificate in ASCII text. PEM uses base64 encoding to convert the certificate to
ASCII text, then puts the encoded text between the following delimiters:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
To use this command, you must already have obtained a copy of the certificate authority’s
certificate as a PKCS #7 object file. Then do the following:
1. Open the PKCS #7 object file with an ASCII text editor such as Notepad or vi.
2. Enter the crypto ca-certificate command on the CLI command line.
Cryptography Commands
Commentaires sur ces manuels