Motorola WiNG 5 System Reference Manual page 587

Table of Contents

Advertisement

Self-signed certificates cannot be revoked which may allow an attacker who has already gained access to monitor and
inject data into a connection to spoof an identity if a private key has been compromised. However, CAs have the ability
to revoke a compromised certificate, which prevents its further use.
13.Define the following configuration parameters required for the
Certificate Name
From Network
Cut and Paste
URL
Figure 12-14 Import Signed Cert screen
Enter the 32 character maximum name of the trustpoint with which the
certificate should be associated
Select the From Network radio button to provide network address information
to the location of the target signed certificate. The number of additional fields
that populate the screen is dependent on the selected protocol. This is the
default setting.
Select the Cut and Paste radio button to copy an existing signed certificate into
the cut and past field. When pasting a signed certificate, no additional network
address information is required.
Provide the complete URL to the location of the signed certificate. If needed,
select Advanced to expand the dialog to display network address information
to the location of the signed certificate. The number of additional fields that
populate the screen is also dependent on the selected protocol.
Import
of the CA certificate:
Operations 12 - 23

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents