15 CRYPTOGRAPHY COMMANDS
Use cryptography commands to configure and manage certificates and
public-private key pairs for system authentication. Depending on your
network configuration, you must create keys and certificates to
authenticate the WX switch to IEEE 802.1X wireless clients for which the
WX switch performs authentication, and to 3Com wireless switch
manager (3WXM) and Web Manager.
Commands by
Usage
This chapter presents cryptography commands alphabetically. Use
Table82 to locate commands in this chapter based on their use.
Table82 Cryptography Commands by Usage
Type Command
Encryption Keys crypto generate key on page 473
display crypto key ssh on page 483
PKCS #7 Certificates crypto generate request on page 474
crypto ca-certificate on page 470
display crypto ca-certificate on
page481
crypto certificate on page 471
display crypto certificate on page482
PKCS #12 Certificate crypto otp on page478
crypto pkcs12 on page 479
Self-Signed Certificate crypto generate self-signed on
page476