15
C
RYPTOGRAPHY
C
OMMANDS
Use cryptography commands to configure and manage certificates and
public-private key pairs for system authentication. Depending on your
network configuration, you must create keys and certificates to
authenticate the WX switch to IEEE 802.1X wireless clients for which the
WX switch performs authentication, and to 3Com wireless switch
manager (3WXM) and Web Manager.
Commands by
Usage
This chapter presents cryptography commands alphabetically. Use
Table 82 to locate commands in this chapter based on their use.
Table 82
Cryptography Commands by Usage
Type
Command
Encryption Keys
crypto generate key
on page 473
display crypto key ssh
on page 483
PKCS #7 Certificates
crypto generate request
on page 474
crypto ca-certificate
on page 470
display crypto ca-certificate
on
page 481
crypto certificate
on page 471
display crypto certificate
on page 482
PKCS #12 Certificate
crypto otp
on page 478
crypto pkcs12
on page 479
Self-Signed Certificate crypto generate self-signed
on
page 476
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...