Motorola WiNG 5 System Reference Manual page 589

Table of Contents

Advertisement

16.Define the following configuration parameters required for the
Trustpoint Name
Key Passphrase
URL
Protocol
Figure 12-15 Export Trustpoint screen
Enter the 32 character maximum name assigned to the target trustpoint. The
trustpoint signing the certificate can be a certificate authority, corporation or
individual.
Define the key used by both the access point and the server (or repository) of
the target trustpoint. Select the Show textbox to expose the actual characters
used in the key. Leaving the checkbox unselected displays the passphrase as a
series of asterisks "*".
Provide the complete URL to the location of the trustpoint. If needed, select
Advanced to expand the dialog to display network address information to the
location of the target trustpoint. The number of additional fields that populate
the screen is dependent on the selected protocol.
Select the protocol used for exporting the target trustpoint. Available options
include:
• tftp
• ftp
• sftp
• http
• cf
• usb1
• usb2
Export
of the trustpoint.
Operations 12 - 25

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents