13 - 126 WiNG 5.6 Access Point System Reference Guide
5. Review the following VPN peer security association statistics:
13.3.25 Certificates
Access Point Statistics
The
Secure Socket Layer
(SSL) protocol ensures secure transactions between Web servers and browsers. SSL uses a third-party
certificate authority to identify one (or both) ends of a transaction. A browser checks the certificate issued by the server before
establishing a connection.
This screen is partitioned into the following:
•
Trustpoints
•
RSA Keys
13.3.25.1 Trustpoints
Certificates
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate authority, corporate
or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration parameters
and an association with an enrolled identity certificate.
1. Select the
Statistics
menu from the Web UI.
2. Select
System
from the navigation pane (on the left-hand side of the screen). Expand a RF Domain and select one of its
connected access points
3. Select
Certificates
and expand the menu to reveal its sub menu items
.
4. Select
Trustpoints
.
Peer
Lists IP addresses for peers sharing
security associations
(SAs) for tunnel interoperability.
When a peer sees a sensitive packet, it creates a secure tunnel and sends the packet through
the tunnel to its destination.
Local IP Address
Displays each listed peer’s local tunnel end point IP address. This address represents an
alternative to an interface IP address.
Protocol
Lists the security protocol used with the VPN IPSec tunnel connection. SAs are unidirectional,
existing in each direction and established per security protocol. Options include
ESP
and
AH
.
State
Lists the state of each listed peer’s security association.
SPI In
Lists
stateful packet inspection
(SPI) status for incoming IPSec tunnel packets. SPI tracks each
connection traversing the IPSec VPN tunnel and ensures they are valid.
SPI Out
Lists SPI status for outgoing IPSec tunnel packets. SPI tracks each connection traversing the
IPSec VPN tunnel and ensures they are valid.
Mode
Displays the IKE mode as either
Main
or
Aggressive
. IPSEC has two modes in IKEv1 for key
exchanges. Aggressive mode requires 3 messages be exchanged between the IPSEC peers to
setup the SA, Main requires 6 messages.
Clear All
Select the
Clear All
button to clear each peer of its current status and begin a new data
collection.
Refresh
Select the
Refresh
button to update the screen’s statistics counters to their latest values.
Summary of Contents for WiNG 5.6
Page 1: ...Motorola Solutions WiNG 5 6 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 22: ...8 WiNG 5 6 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 6 Access Point System Reference Guide ...
Page 38: ...2 12 WiNG 5 6 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 6 Access Point System Reference Guide ...
Page 468: ...6 2 WiNG 5 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 568: ...6 102 WiNG 5 6 Access Point System Reference Guide ...
Page 614: ...7 46 WiNG 5 6 Access Point System Reference Guide ...
Page 660: ...8 46 WiNG 5 6 Access Point System Reference Guide ...
Page 716: ...9 56 WiNG 5 6 Access Point System Reference Guide ...
Page 730: ...10 14 WiNG 5 6 Access Point System Reference Guide ...
Page 982: ...14 20 WiNG 5 6 Access Point System Reference Guide ...
Page 984: ...A 2 WiNG 5 6 Access Point System Reference Guide ...
Page 1046: ...B 62 WiNG 5 6 Access Point System Reference Guide ...
Page 1047: ......