Operations 12 - 55
9. Define the following configuration parameters required for the
Export
of the trustpoint:
10. Select
OK
to export the trustpoint. Select
Cancel
to revert the screen to its last saved configuration.
11. To optionally delete a trustpoint, select the
Delete
button from the Trustpoints screen. Provide the trustpoint name within
the
Delete Trustpoint
screen and optionally select the
Delete RSA Key
option to remove the RSA key along with the
trustpoint. Select
OK
to proceed with the deletion, or
Cancel
to revert to the last saved configuration.
12.2.2 RSA Key Management
Certificates
Refer to the RSA Keys screen to review existing RSA key configurations that have been applied to managed devices. If an
existing key does not meet the needs of a pending certificate request, generate a new key or import or export an existing key
to and from a remote location.
Rivest, Shamir, and Adleman
(RSA) is an algorithm for public key cryptography. It’s an algorithm that can be used for certificate
signing and encryption. When a device trustpoint is created, the RSA key is the private key used with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to and from remote locations:
Trustpoint Name
Enter the 32 character maximum name assigned to the target trustpoint. The trustpoint
signing the certificate can be a certificate authority, corporation or individual.
URL
Provide the complete URL to the location of the trustpoint. If needed, select Advanced to
expand the dialog to display network address information to the location of the target
trustpoint. The number of additional fields that populate the screen is dependent on the
selected protocol.
Protocol
Select the protocol used for exporting the target trustpoint. Available options include:
• tftp
• ftp
• sftp
• http
• cf
• usb1
• usb2
• usb3
• usb4
Port
If using
Advanced
settings, use the spinner control to set the port. This option is not valid
for
cf
and
usb1 - 4.
IP Address
If using
Advanced
settings, enter IP address of the server used to export the trustpoint.
This option is not valid for
cf
and
usb1 - 4.
Hostname
If using
Advanced
settings, provide the hostname of the server used to export the
trustpoint. This option is not valid for
cf
and
usb1 - 4.
Username/Password
These fields are enabled if using
ftp
or
sftp
protocols. Specify the username and the
password for that username to access the remote servers using these protocols.
Path
If using
Advanced
settings, specify the path to the trustpoint. Enter the complete relative
path to the file on the server.
Summary of Contents for WiNG 5.6
Page 1: ...Motorola Solutions WiNG 5 6 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 22: ...8 WiNG 5 6 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 6 Access Point System Reference Guide ...
Page 38: ...2 12 WiNG 5 6 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 6 Access Point System Reference Guide ...
Page 468: ...6 2 WiNG 5 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 568: ...6 102 WiNG 5 6 Access Point System Reference Guide ...
Page 614: ...7 46 WiNG 5 6 Access Point System Reference Guide ...
Page 660: ...8 46 WiNG 5 6 Access Point System Reference Guide ...
Page 716: ...9 56 WiNG 5 6 Access Point System Reference Guide ...
Page 730: ...10 14 WiNG 5 6 Access Point System Reference Guide ...
Page 982: ...14 20 WiNG 5 6 Access Point System Reference Guide ...
Page 984: ...A 2 WiNG 5 6 Access Point System Reference Guide ...
Page 1046: ...B 62 WiNG 5 6 Access Point System Reference Guide ...
Page 1047: ......