Table 54: Commands to Create Certificates and Private Key (continued)
Command
show ssl
show ssl detail
configure ssl certificate
pregenerated
configure ssl privkey
pregenerated
Example Wireless Configuration Processes
This section provides examples of configuration processes. In the first example, the wireless
management VLAN is configured, IP addresses are assigned, and RF profiles are created and
configured. Next, security profile examples are given for a variety of security options. Finally, example
steps are provided for assigning profiles to ports.
NOTE
The commands provided in each step are examples.
Wireless Management Configuration Example
Refer to the following example when configuring VLAN, IP addresses, and RF profiles.
NOTE
Any addition, deletion or movement of wireless ports from vlan to vlan must be preceded by disabling
the wireless port(s).
Configure the VLAN, Wireless Port IP Addresses and RF-profiles:
1 Create a vlan to be use as the wireless management VLAN.
create vlan manage-wireless
Summit 300-48 Switch Software User Guide
Description
Displays the following information:
•
HTTPS port configured. This is the port on which the clients will connect.
•
Result of a check to see whether the private key matches with the public
key stored in the certificate.
•
Length of RSA key (number of bits used to generate the private key)
•
Basic information about the stored certificate.
Provides the same output as the show ssl command, plus the complete
certificate. Private key (in PEM format) will be displayed for users with
administration privileges.
Obtains the pre-generated certificate from the user. This command is also
used when downloading/ uploading the configuration. The certificate
information stored in the uploaded configuration file should not be modified,
because it is signed using the issuer's private key.
The certificate and private key file should be in PEM format and generated
using RSA as the cryptography algorithm.
Obtains the pregenerated private key from the user. This command will also
be used when downloading/uploading the configuration. The private key will be
stored in the uploaded configuration file in an encrypted format using a hard
coded passphrase. Hence the private key information in the configuration file
should not be modified.
The certificate and private key file should be in PEM format and generated
using RSA as the cryptography algorithm.
Example Wireless Configuration Processes
115