Rsa Key Management - Motorola WiNG 5.5 Reference Manual

Table of Contents

Advertisement

12 - 42 WiNG 5.5 Access Point System Reference Guide
9. Define the following configuration parameters required for the
Trustpoint Name
URL
Protocol
Port
IP Address
Hostname
Username/Password
Path
10. Select
OK
to export the trustpoint. Select
11. To optionally delete a trustpoint, select the
the
Delete Trustpoint
trustpoint. Select

12.2.2 RSA Key Management

Certificates
Refer to the RSA Keys screen to review existing RSA key configurations that have been applied to managed devices. If an
existing key does not meet the needs of a pending certificate request, generate a new key or import or export an existing key
to and from a remote location.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It's an algorithm that can be used for certificate
signing and encryption. When a device trustpoint is created, the RSA key is the private key used with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to and from remote locations:
Enter the 32 character maximum name assigned to the target trustpoint. The trustpoint
signing the certificate can be a certificate authority, corporation or individual.
Provide the complete URL to the location of the trustpoint. If needed, select Advanced to
expand the dialog to display network address information to the location of the target
trustpoint. The number of additional fields that populate the screen is dependent on the
selected protocol.
Select the protocol used for exporting the target trustpoint. Available options include:
• tftp
• ftp
• sftp
• http
• cf
• usb1
• usb2
• usb3
• usb4
If using Advanced settings, use the spinner control to set the port. This option is not valid
for cf and usb1 - 4.
If using Advanced settings, enter IP address of the server used to export the trustpoint.
This option is not valid for cf and usb1 - 4.
If using Advanced settings, provide the hostname of the server used to export the
trustpoint. This option is not valid for cf and usb1 - 4.
These fields are enabled if using ftp or sftp protocols. Specify the username and the
password for that username to access the remote servers using these protocols.
If using Advanced settings, specify the path to the trustpoint. Enter the complete relative
path to the file on the server.
Cancel
Delete
screen and optionally select the
OK
to proceed with the deletion, or
Export
of the trustpoint:
to revert the screen to its last saved configuration.
button from the Trustpoints screen. Provide the trustpoint name within
Delete RSA Key
option to remove the RSA key along with the
Cancel
to revert to the last saved configuration.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents