13

CRYPTOGRAPHY COMMANDS

 

Use cryptography commands to configure and manage certificates and public-private key pairs for system authentication. Depending on your network configuration, you must create keys and certificates to authenticate the WX switch to IEEE 802.1X wireless clients for which the WX switch performs authentication, and to 3Com wireless switch manager (3WXM) and Web Manager.

Commands by

This chapter presents cryptography commands alphabetically. Use

Usage

Table 73 to locate commands in this chapter based on their use.

 

Table 73 Cryptography Commands by Usage

Type

Command

 

 

Encryption Keys

crypto generate key on page 397

 

 

 

display crypto key ssh on page 407

 

 

PKCS #7 Certificates

crypto generate request on page 398

 

 

 

crypto ca-certificateon page 394

 

 

 

display crypto ca-certificateon

 

page 405

 

 

 

crypto certificate on page 395

 

 

 

display crypto certificate on page 406

 

 

PKCS #12 Certificate

crypto otp on page 402

 

 

 

crypto pkcs12 on page 403

 

 

Self-Signed Certificate

crypto generate self-signedon

 

page 400

 

 

Page 393
Image 393
3Com 3CRWX120695A, 3CRWX440095A manual To locate commands in this chapter based on their use, Cryptography Commands by Usage