Creating A Certificate For Onboard Radius Authentication - Motorola AP-7131 Product Reference Manual

Hide thumbs Also See for AP-7131:
Table of Contents

Advertisement

4-22
AP-7131 Access Point Product Reference Guide
NOTE If the access point is restarted after a certificate request has been
8. To use the certificate for a VPN tunnel, first define a tunnel and select the IKE settings to
use either RSA or DES certificates. For additional information on configuring VPN tunnels,
see
Configuring VPN Tunnels on page

4.5.3 Creating a Certificate for Onboard Radius Authentication

The access point can use its on-board Radius Server to generate certificates to authenticate MUs for
use with the access point. In addition, a Windows 2000 or 2003 Server is used to sign the certificate
before downloading it back to the access point's on-board Radius server and loading the certificate
for use with the access point.
Both a CA and Self certificate are required for Onboard Radius Authentication. For information on CA
Certificates, see
Encoded format or risk loading an invalid certificate.
CAUTION If using the Radius time-based authentication feature to authenticate
!
CAUTION Self certificates can only be generated using the access point GUI and
!
To create a self certificate for on-board Radius authentication:
1. Select
System Configuration
point menu tree.
2. Click on the
The
Certificate Request
3. Complete the request form with the pertinent information.
Key ID (required)
generated but before the signed certificate is imported, the import will not
execute properly. Do not restart the access point during this process.
Importing a CA Certificate on page 4-16
access point user permissions, ensure the access point's time is
synchronized with the CA server used to generate certificate requests.
CLI interfaces. No functionality exists for creating a self-certificate
using the access point's SNMP configuration option.
Add
button to create the certificate request.
screen displays.
Enter a logical name for the certificate to help distinguish between
certificates. The name can be up to 7 characters in length.
6-35.
.
Ensure the certificate is in a Base 64
->
Certificate Mgmt
->
Self Certificates
from the access

Advertisement

Table of Contents
loading

Table of Contents