User`s manual
256
DWS-1008 User’s Manual
D-Link Systems, Inc.
Managing Keys and Certicates
2. Inside the switch’s digital certicate is the switch’s public key, which the wireless client
uses to encrypt a pre-master secret key.
3. The wireless client then sends the key back to the switch so that both the switch and the
client can derive a key from this pre-master secret for secure authentication and wireless
session encryption.
Clients authenticated by PEAP need a certicate in the switch only when the switch performs
PEAP locally, not when EAP processing takes place on a RADIUS server.
About Keys and Certicates
Public-private key pairs and digital signatures and certicates allow keys to be generated
dynamically so that data can be securely encrypted and delivered. You generate the key pairs
and certicates on the switch or install them on the switch after enrolling with a certicate
authority (CA). The switch can generate key pairs, self-signed certicates, and Certicate
Signing Requests (CSRs), and can install key pairs, server certicates, and certicates
generated by a CA.
When the switch needs to communicate with an 802.1X client, MSS requests a private key
from the switch’s certicate and key store:
• If no private key is available in the switch’s certicate and key store, the switch does
not respond to the request from MSS. If the switch does have a private key in its key
store, MSS requests a corresponding certicate.
• If the switch has a self-signed certicate in its certicate and key store, the switch
responds to the request from MSS. If the certicate is not self-signed, the switch
looks for a CA’s certicate with which to validate the server certicate.
• If the switch has no corresponding CA certicate, the switch does not respond to
the request from MSS. If the switch does have a corresponding CA certicate, and
the server certicate is validated (date still valid, signature approved), the switch
responds.
If the switch does not respond to the request from MSS, authentication fails and access is
denied.
For EAP (802.1X) users, the public-private key pairs and digital certicates can be stored on
a RADIUS server. In this case, the switch operates as a pass-through authenticator.