User's Manual

Table Of Contents
Fortress ES-Series CLI Guide: Network Security, Authentication and Auditing
124
Trusted OCSP Responder certificates are certificates (or
certificate chains of multiple certificates of one or more
trusted OCSP responders) associated with OCSP
responders from which the Mesh Point always accepts
signed OCSP responses. You must specify a trusted OCSP
responder certificate, with
-ocsp. Use -url to configure the
standard http address (full IP address or domain name) of
the certificate server from which the certificate or certificate
chain being installed will be retrieved. Use
-ldapattr to
specify whether the certificate attribute for retrieval is a CA
certificate, with
ca, or an end user certificate, with user.
# import certificate -ocsp -url
<CertSrvrURL>
-ldapsb
<searchBaseDN>
-ldapattr ca|user
You can delete the entire contents of the Mesh Point certificate
store with
-all, or all of those certificates that have -expired:
CAUTION: If you
delete the only
available certificate(s)
for the Mesh Point GUI’s
SSL connection, your
session will end and
you will not be able to
reconnect until, after a
brief delay, the default
self-signed SSL certifi-
cate has been automati-
cally restored.
# del certificate -all|-expired
You can also delete a specific certificate by -name. If the
certificate is a CA certificate, add the
-ca switch. If it is the
certificate for a trusted OCSP responder, add
-ocsp.
# del certificate -name <
CertificateName>
-ca -ocsp
You must be logged on to an
administrator
-level account to
change configuration settings (refer to Section 2.2).
4.2.2.2 Assigning Stored Certificates to Mesh Point Functions
Locally stored signed certificates can have any of three
applications on the Mesh Point, as indicated in the
Usage
column of the
show certificate output:
ssl - the Secure Socket Layer certificate is used by the
Mesh Point GUI to secure browser connections to the
management interface via https.
By default, the Mesh Point GUI uses the automatically
generated self-signed certificate for SSL. When additional
certificates have been imported, you can change this
assignment.
NOTE:
The IPsec
certificate assign-
ment option applies on
ES-series Mesh Points
only when a Suite B
license has been
installed (refer to Sec-
tion 5.6).
IPsec - the Internet Protocol Security certificate is used to
authenticate an IPsec-licensed/enabled Mesh Point as an
endpoint in IPsec transactions (refer to Section 4.4.1).
EAP-TLS - the Extensible Authentication Protocol-Transport
Layer Security certificate is used:
to authenticate EAP-TLS 802.1X supplicants—when
the Mesh Point’s internal authentication server is
configured to provide 802.1X authentication service
(refer to Section 4.5.2.4).
to authenticate an ES210 Mesh Point as a wireless
station—when it is dedicated to act as a wireless Client
(refer to Section 3.4.10).