Certificates; Trustpoints - Motorola WiNG 5.5 Reference Manual

Table of Contents

Advertisement

13 - 124 WiNG 5.5 Access Point System Reference Guide
5. Review the following VPN peer security association statistics:
Peer
Local IP Address
Protocol
State
SPI In
SPI Out
Mode
Clear All
Refresh

13.3.25 Certificates

Access Point Statistics
The Secure Socket Layer (SSL) protocol ensures secure transactions between Web servers and browsers. SSL uses a third-party
certificate authority to identify one (or both) ends of a transaction. A browser checks the certificate issued by the server before
establishing a connection.
This screen is partitioned into the following:

Trustpoints

RSA Keys
13.3.25.1 Trustpoints
Certificates
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate authority, corporate
or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration parameters
and an association with an enrolled identity certificate.
1. Select the
Statistics
2. Select
System
connected access points
3. Select
Certificates
4. Select Trustpoints.
Lists IP addresses for peers sharing security associations (SAs) for tunnel interoperability.
When a peer sees a sensitive packet, it creates a secure tunnel and sends the packet through
the tunnel to its destination.
Displays each listed peer's local tunnel end point IP address. This address represents an
alternative to an interface IP address.
Lists the security protocol used with the VPN IPSec tunnel connection. SAs are unidirectional,
existing in each direction and established per security protocol. Options include ESP and AH.
Lists the state of each listed peer's security association.
Lists stateful packet inspection (SPI) status for incoming IPSec tunnel packets. SPI tracks each
connection traversing the IPSec VPN tunnel and ensures they are valid.
Lists SPI status for outgoing IPSec tunnel packets. SPI tracks each connection traversing the
IPSec VPN tunnel and ensures they are valid.
Displays the IKE mode as either Main or Aggressive. IPSEC has two modes in IKEv1 for key
exchanges. Aggressive mode requires 3 messages be exchanged between the IPSEC peers to
setup the SA, Main requires 6 messages.
Select the Clear All button to clear each peer of its current status and begin a new data
collection.
Select the Refresh button to update the screen's statistics counters to their latest values.
menu from the Web UI.
from the navigation pane (on the left-hand side of the screen). Expand a RF Domain and select one of its
and expand the menu to reveal its sub menu
items.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents