Cryptography Commands - D-Link DWS-1008 Cli Reference Manual

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008:
Table of Contents

Advertisement

DWS-1008 CLI Reference Guide
Use cryptography commands to configure and manage certificates and public-private key
pairs for system authentication. Depending on your network configuration, you must create
keys and certificates to authenticate the switch to IEEE 802.1X wireless clients for which the
switch performs authentication.
crypto ca-certificate
Installs a certificate authority's own PKCS #7 certificate into the DWS-1008 switch certificate
and key storage area.
Syntax: crypto ca-certificate {eap}
PEM-formatted-certificate
eap
PEM-formatted-
Defaults: None
Usage: The Privacy-Enhanced Mail protocol (PEM) format is used for representing a PKCS
#7 certificate in ASCII text. PEM uses base64 encoding to convert the certificate to
ASCII text, then puts the encoded text between the following delimiters:
-----BEGIN CERTIFICATE-----
-----END CERTIFICATE-----
To use this command, you must already have obtained a copy of the certificate authority's
certificate as a PKCS #7 object file. Then do the following:
1. Open the PKCS #7 object file with an ASCII text editor such as Notepad or vi.
2. Enter the crypto ca-certificate command on the CLI command line.
D-Link Systems, Inc.

Cryptography Commands

Stores the certificate authority's certificate that signed the Extensible
Authentication Protocol (EAP) certificate for the switch.
The EAP certificate authenticates the to 802.1X supplicants (clients).
ASCII text representation of the certificate authority PKCS #7
certificate, certificate consisting of up to 4096 characters that you have
obtained from the certificate authority.
Access: Enabled
Cryptography Commands
289

Advertisement

Table of Contents
loading

Table of Contents