Specifications
Switch Security 6-81
1. Select the Delete Operations radio button in the wizard and click the Next button.
The next page of the wizard is used to delete a trustpoint.
2. Select the Delete the following for trustpoint checkbox and select the trustpoint to delete from the
drop-down menu associated with it. This enables the following options:
3. Click the Next button to complete the trustpoint removal.
6.10.2 Configuring Trustpoint Associated Keys
Trustpoint keys allow a user to configure the switch to use different Rivest, Shamir, an Adelman (RSA) key
pairs. Therefore, the switch can maintain a different key pair for each certificate.
To configure the keys associated with trustpoints:
1. Select Security > Server Certificates from the main menu tree.
Delete entire trustpoint Select the checkbox and select a certificate to remove. If selected, the Delete the
following trustpoint
option is disabled.
Delete the following for
trustpoint
Select this option to delete the trustpoint for the selected Server Certificate or CA
Root Certificate.
Delete all the keys from the
switch
Select this option to remove all of the keys that have previously been configured for
the deleted trustpoints. Once removed, the keys cannot be restored.