User`s manual
261
DWS-1008 User’s Manual
D-Link Systems, Inc.
Managing Keys and Certicates
You must include a common name (string) when you generate a self-signed certicate. The
other information is optional. Use a fully qualied name if such names are supported on your
network. The certicate appears after you enter this information.
Installing a Key Pair and Certicate from a PKCS #12 Object File
PKCS object les provide a le format for storing and transferring storing data and cryptographic
information. (For more information, see PKCS #7, PKCS #10, and PKCS #12 Object Files.) A
PKCS #12 object le, which you obtain from a CA, includes the private key, a certicate, and
optionally the CA’s own certicate.
After transferring the PKCS #12 le from the CA via FTP and generating a one-time password
to unlock it, you store the le in the switch’s certicate and key store. To set and store a
PKCS #12 object le, follow these steps:
1. Copy the PKCS #12 object le to nonvolatile storage on the swich. Use the following
command:
copy tftp://filename local-filename
2. Enter a one-time password (OTP) to unlock the PKCS #12 object le. The password
must be the same as the password protecting the PKCS #12 le.
The password must contain at least 1 alphanumeric character, with no spaces, and must not
include the following characters:
• Quotation marks (““)
• Question mark (?)
• Ampersand (&)
Note: On a switch that handles communications to or from Microsoft Windows clients, use a
one-time password of 31 characters or fewer.
To enter the one-time password, use the following command:
crypto otp {eap} one-time-password