![3Com OfficeConnect WX1200 Command Reference Manual Download Page 473](http://html1.mh-extra.com/html/3com/officeconnect-wx1200/officeconnect-wx1200_command-reference-manual_3121270473.webp)
crypto generate key
473
crypto generate key
Generates an RSA public-private encryption key pair that is required for a
Certificate Signing Request (CSR) or a self-signed certificate. For SSH, the
command generates an SSH authentication key.
Syntax
—
crypto
generate
key
{
admin
|
eap
|
ssh
|
web
}
{
512
|
1024
|
2048
}
admin
— Generates an administrative key pair for authenticating the
WX switch to 3WXM or Web Manager.
eap
— Generates an EAP key pair for authenticating the WX switch to
802.1X supplicants (clients).
ssh
— Generates a key pair for authenticating the WX switch to
Secure Shell (SSH) clients.
web
— Generates an administrative key pair for authenticating the WX
switch to WebAAA clients.
512
|
1024
|
2048
—
Length of the key pair in bits.
The minimum key size for SSH is 1024.
Defaults
— None.
Access
— Enabled.
History
—Introduced in MSS Version 3.0.
Webaaa
option renamed to
web in MSS Version 4.1.
Usage
— You can overwrite a key by generating another key of the same
type.
SSH requires an SSH authentication key, but you can allow MSS to
generate it automatically. The first time an SSH client attempts to access
the SSH server on a WX switch, the switch automatically generates a
1024-byte SSH key. If you want to use a 2048-byte key instead, use the
crypto generate key ssh 2048
command to generate one.
Examples
— To generate an administrative key for use with 3WXM, type
the following command:
WX4400#
crypto generate key admin 1024
key pair generated
Summary of Contents for OfficeConnect WX1200
Page 36: ...36 CHAPTER 2 ACCESS COMMANDS...
Page 62: ...62 CHAPTER 3 SYSTEM SERVICE COMMANDS...
Page 200: ...200 CHAPTER 7 IP SERVICES COMMANDS...
Page 264: ...264 CHAPTER 8 AAA COMMANDS...
Page 272: ...272 CHAPTER 9 MOBILITY DOMAIN COMMANDS...
Page 392: ...392 CHAPTER 11 MANAGED ACCESS POINT COMMANDS...
Page 444: ...444 CHAPTER 13 IGMP SNOOPING COMMANDS...
Page 468: ...468 CHAPTER 14 SECURITY ACL COMMANDS...
Page 484: ...484 CHAPTER 15 CRYPTOGRAPHY COMMANDS...
Page 532: ...532 CHAPTER 18 SESSION MANAGEMENT COMMANDS...
Page 588: ...588 CHAPTER 20 FILE MANAGEMENT COMMANDS...
Page 596: ...596 CHAPTER 21 TRACE COMMANDS...
Page 608: ...608 CHAPTER 22 SNOOP COMMANDS...
Page 618: ...618 CHAPTER 23 SYSTEM LOG COMMANDS...