Cryptography Commands; Commands By Usage - 3Com Wireless LAN Switch WX1200 Command Reference Manual

Wireless lan mobility system; wireless lan switch and controller
Hide thumbs Also See for Wireless LAN Switch WX1200:
Table of Contents

Advertisement

15
Commands by
Usage
C
RYPTOGRAPHY
Use cryptography commands to configure and manage certificates and
public-private key pairs for system authentication. Depending on your
network configuration, you must create keys and certificates to
authenticate the WX switch to IEEE 802.1X wireless clients for which the
WX switch performs authentication, and to 3Com wireless switch
manager (3WXM) and Web Manager.
This chapter presents cryptography commands alphabetically. Use
Table 82 to locate commands in this chapter based on their use.
Table 82 Cryptography Commands by Usage
Type
Encryption Keys
PKCS #7 Certificates
PKCS #12 Certificate
Self-Signed Certificate crypto generate self-signed on
C
OMMANDS
Command
crypto generate key on page 473
display crypto key ssh on page 483
crypto generate request on page 474
crypto ca-certificate on page 470
display crypto ca-certificate on
page 481
crypto certificate on page 471
display crypto certificate on page 482
crypto otp on page 478
crypto pkcs12 on page 479
page 476

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Wireless LAN Switch WX1200 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Wx4400Wxr1003crwx440095a3crwx120695a3crwxr10095a

Table of Contents