5 - 198 WiNG 5.6 Access Point System Reference Guide
Refer to the
Device Time
parameter to assess the device’s current time. If the device’s time has not been set, the device
time is displayed as unavailable. Select
Refresh
to update the device’s system time.
Use the
New Time
parameter to set the calendar day, hour and minute. Use the AM and PM radio buttons to refine whether
the updated time is for the AM or PM. This time can be synchronized with the use of an external NTP resource.
When completed, select
Update Clock
to commit the updated time to the device.
8. Select
OK
to save the changes to the basic configuration. Selecting
Reset
reverts the screen to its last saved configuration.
5.4.2 Certificate Management
Overriding a Device Configuration
A certificate links identity information with a public key enclosed in the certificate.
A
certificate authority
(CA) is a network authority that issues and manages security credentials and public keys for message
encryption. The CA signs all digital certificates it issues with its own private key. The corresponding public key is contained
within the certificate and is called a CA certificate. A browser must contain this CA certificate in its Trusted Root Library so it
can trust certificates signed by the CA's private key.
Depending on the public key infrastructure, the digital certificate includes the owner's public key, the certificate expiration
date, the owner's name and other public key owner information.
Each certificate is digitally signed by a trustpoint. The trustpoint signing the certificate can be a certificate authority,
corporation or individual. A trustpoint represents a CA/identity pair containing the identity of the CA, CA-specific configuration
parameters, and an association with an enrolled identity certificate.
SSH keys are a pair of cryptographic keys used to authenticate users instead of, or in addition to, a username/password. One
key is private and the other is public key.
Secure Shell
(SSH) public key authentication can be used by a client to access
resources, if properly configured. A RSA key pair must be generated on the client. The public portion of the key pair resides
with the licensed device, while the private portion remains on the client.
The certificate configuration used by an access point managed device can be changed (overridden) as changes in security
credentials require modification in the management of the device.
To override a managed device’s certificate configuration:
1. Select the
Configuration
tab from the Web UI.
2. Select
Devices
.
3. Select
Device Overrides
.
4. Select a target device’s MAC address from the device browser in the lower, left-hand side of the UI.
5. Select
Certificates
from the
Device
menu.
Summary of Contents for WiNG 5.6
Page 1: ...Motorola Solutions WiNG 5 6 ACCESS POINT SYSTEM REFERENCE GUIDE ...
Page 2: ......
Page 22: ...8 WiNG 5 6 Access Point System Reference Guide ...
Page 26: ...1 4 WiNG 5 6 Access Point System Reference Guide ...
Page 38: ...2 12 WiNG 5 6 Access Point System Reference Guide ...
Page 74: ...3 36 WiNG 5 6 Access Point System Reference Guide ...
Page 468: ...6 2 WiNG 5 6 Access Point System Reference Guide Figure 6 1 Configuration Wireless menu ...
Page 568: ...6 102 WiNG 5 6 Access Point System Reference Guide ...
Page 614: ...7 46 WiNG 5 6 Access Point System Reference Guide ...
Page 660: ...8 46 WiNG 5 6 Access Point System Reference Guide ...
Page 716: ...9 56 WiNG 5 6 Access Point System Reference Guide ...
Page 730: ...10 14 WiNG 5 6 Access Point System Reference Guide ...
Page 982: ...14 20 WiNG 5 6 Access Point System Reference Guide ...
Page 984: ...A 2 WiNG 5 6 Access Point System Reference Guide ...
Page 1046: ...B 62 WiNG 5 6 Access Point System Reference Guide ...
Page 1047: ......