Installing Ca-Signed Certificates Using A Pkcs #10 Object File (Csr) And A Pkcs #7 Object File - D-Link DWS-1008 - AirPremier MobileLAN Switch Product Manual

8 port 10/100 wireless switch with power over ethernet
Hide thumbs Also See for DWS-1008 - AirPremier MobileLAN Switch:
Table of Contents

Advertisement

5. Unpack the PKCS #12 object files into the certificate and key storage area on the switch.
Use the following command:
crypto pkcs12 {admin | eap | web} filename
The filename is the location of the file on the switch. For example:
DWS-1008# crypto pkcs12 admin 2048admn.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
DWS-1008# crypto pkcs12 eap 20481x.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
DWS-1008# crypto pkcs12 web 2048web.p12
Unwrapped from PKCS12 file:
keypair
device certificate
CA certificate
Note: MSS erases the OTP password entered with the crypto otp command when you enter the
crypto pkcs12 command.
Installing CA-Signed Certificates Using a PKCS #10
Object File (CSR) and a PKCS #7 Object File
This scenario shows how to use CSRs to install public-private key pairs, CA-signed certificates, and CA
certifies for administrative access, 802.1X (EAP) access, and WebAAA access.
1. Set time and date parameters, if not already set. (See "Configuring and Managing Time
Parameters".)
2. Generate public-private key pairs:
DWS-1008# crypto generate key admin 1024
key pair generated
DWS-1008# crypto generate key eap 1024
key pair generated
DWS-1008# crypto generate key web 1024
key pair generated
D-Link DWS-1008 User Manual


Advertisement

Table of Contents
loading

Table of Contents