User`s manual
255
DWS-1008 User’s Manual
D-Link Systems, Inc.
Managing Keys and Certicates
A digital certicate is a form of electronic identication for computers. The DWS-1008 switch
requires digital certicates to authenticate its communications to Extensible Authentication
Protocol (EAP) clients for which the switch performs all EAP processing. Certicates can be
generated on the switch or obtained from a certicate authority (CA). Keys contained within
the certicates allow the switch, its servers, and its wireless clients to exchange information
secured by encryption.
Note: Before installing a certicate, verify with the show timedate and show timezone
commands that the switch is set to the correct date, time, and time zone. Otherwise,
certicates might not be installed correctly.
Why Use Keys and Certicates?
Certain switch operations require the use of public-private key pairs and digital certicates. All
users for which the switch performs IEEE 802.1X EAP authentication require public-private
key pairs and digital certicates to be installed on the switch.
These keys and certicates are fundamental to securing wireless, wired authentication, and
administrative connections because they support Wi-Fi Protected Access (WPA) encryption
and dynamic Wired-Equivalency Privacy (WEP) encryption.
Wireless Security through TLS
In the case of wireless or wired authentication 802.1X users whose authentication is
performed by the switch, the rst stage of any EAP transaction is Transport Layer Security
(TLS) authentication and encryption.
TLS allows the client to authenticate the switch (and optionally allows the switch to authenticate
the client) through the use of digital signatures. Digital signatures require a public-private key
pair. The signature is created with a private key and veried with a public key. TLS enables
secure key exchange.
PEAP-MS-CHAP-V2 Security
PEAP performs a TLS exchange for server authentication and allows a secondary
authentication to be performed inside the resulting secure channel for client authentication.
For example, the Microsoft Challenge Handshake Authentication Protocol version 2
(MS-CHAP-V2) performs mutual MS-CHAP-V2 authentication inside an encrypted TLS
channel established by PEAP.
1. To form the encrypted TLS channel, the switch must have a digital certicate and must
send that certicate to the wireless client.
Managing Keys and Certificates