13
Commands by
Usage
crypto ca-certificate
C
RYPTOGRAPHY
Use cryptography commands to configure and manage certificates and
public-private key pairs for system authentication. Depending on your
network configuration, you must create keys and certificates to
authenticate the WX switch to IEEE 802.1X wireless clients for which the
WX switch performs authentication, and to 3Com wireless switch
manager (3WXM) and Web Manager.
This chapter presents cryptography commands alphabetically. Use
Table 72 to locate commands in this chapter based on their use.
Table 72 Cryptography Commands by Usage
Type
Encryption Keys
PKCS #7 Certificates
PKCS #12 Certificate
Self-Signed Certificate "crypto generate self-signed" on page 395
Installs a certificate authority's own PKCS #7 certificate into the WX
certificate and key storage area.
C
OMMANDS
Command
"crypto generate key" on page 392
"crypto generate request" on page 393
"crypto ca-certificate" on page 389
"display crypto ca-certificate" on page 400
"crypto certificate" on page 391
"display crypto certificate" on page 401
"crypto otp" on page 397
"crypto pkcs12" on page 399