User`s manual
259
DWS-1008 User’s Manual
D-Link Systems, Inc.
Managing Keys and Certicates
PKCS #12 Personal
Information
Exchange
Syntax
Standard
Contains a certicate signed by a CA and a
public-private key pair provided by the CA
to go with the certicate.
Because the key pair comes from the CA,
you do not need to generate a key pair or
a certicate request on the switch. Instead,
use the copy tftp command to copy the le
onto The switch.
Use the crypto otp command to enter the
one-time password assigned to the le by
the CA. (This password secures the le
so that the keys and certicate cannot be
installed by an unauthorized party. You
must know the password in order to install
them.)
Use the crypto pkcs12 command to
unpack the le.
Creating Keys and Certicates
You must create a public-private key pair, and request, accept, or generate a digital certicate
to exchange with 802.1X users for network access. The digital certicates can be self-signed or
signed by a certicate authority (CA). If you use certicates signed by a CA, you must also
install a certicate from the CA to validate the digital signatures of the certicates installed on
the switch.
Each of the following types of access requires a separate key pair and certicate:
• EAP - 802.1X access for network users who can access SSIDs encrypted by WEP or
WPA, and for users connected to wired authentication ports
Management access to the CLI through Secure Shell (SSH) also requires a key pair, but
does not use a certicate.
Choosing the Appropriate Certicate Installation Method for Your Network
Depending on your network environment, you can use any of the following methods to install
certicates and their public-private key pairs. The methods differ in terms of simplicity and
security. The simplest method is also the least secure, while the most secure method is
slightly more complex to use.
• Self-signed certicate - The easiest method to use because a CA server is not
required. The switch generates and signs the certicate itself. This method is the
simplest but is also the least secure, because the certicate is not validated (signed)
by a CA.