Cryptography commands, Commands by usage, Ryptography – 3Com Wireless LAN WX1200 User Manual

Page 469: Ommands

Advertising
background image

15

C

RYPTOGRAPHY

C

OMMANDS

Use cryptography commands to configure and manage certificates and
public-private key pairs for system authentication. Depending on your
network configuration, you must create keys and certificates to
authenticate the WX switch to IEEE 802.1X wireless clients for which the
WX switch performs authentication, and to 3Com wireless switch
manager (3WXM) and Web Manager.

Commands by
Usage

This chapter presents cryptography commands alphabetically. Use
Table 82 to locate commands in this chapter based on their use.

Table 82 Cryptography Commands by Usage

Type

Command

Encryption Keys

crypto generate key on page 473

display crypto key ssh on page 483

PKCS #7 Certificates

crypto generate request on page 474

crypto ca-certificate on page 470

display crypto ca-certificate on
page 481

crypto certificate on page 471

display crypto certificate on page 482

PKCS #12 Certificate

crypto otp on page 478

crypto pkcs12 on page 479

Self-Signed Certificate crypto generate self-signed on

page 476

Advertising