HP Manager Software manual To locate commands in this chapter based on their use

Models: Manager Software

1 616
Download 616 pages 38.63 Kb
Page 447
Image 447

13

CRYPTOGRAPHY COMMANDS

 

Use cryptography commands to configure and manage certificates and public-private key pairs for system authentication. Depending on your network configuration, you must create keys and certificates to authenticate the WX switch to IEEE 802.1X wireless clients for which the WX switch performs authentication, and to 3Com wireless switch manager (3WXM) and Web Manager.

Commands by

This chapter presents cryptography commands alphabetically. Use

Usage

Table 82 to locate commands in this chapter based on their use.

 

Table 82 Cryptography Commands by Usage

Type

Command

 

 

Encryption Keys

crypto generate key on page 451

 

 

 

display crypto key ssh on page 461

 

 

PKCS #7 Certificates

crypto generate request on page 452

 

 

 

crypto ca-certificateon page 448

 

 

 

display crypto ca-certificateon

 

page 459

 

 

 

crypto certificate on page 449

 

 

 

display crypto certificate on page 460

 

 

PKCS #12 Certificate

crypto otp on page 456

 

 

 

crypto pkcs12 on page 457

 

 

Self-Signed Certificate

crypto generate self-signedon

 

page 454

 

 

Page 447
Image 447
HP Manager Software manual To locate commands in this chapter based on their use, Cryptography Commands by Usage