Rsa key management – Brocade Mobility Access Point System Reference Guide (Supporting software release 5.5.0.0 and later) User Manual
Page 692
682
Brocade Mobility Access Point System Reference Guide
53-1003100-01
12
7. Select OK to export the trustpoint. Select Cancel to revert the screen to its last saved
configuration.
8. To optionally delete a trustpoint, select the Delete button from the Trustpoints screen. Provide
the trustpoint name within the Delete Trustpoint screen and optionally select the Delete RSA
Key option to remove the RSA key along with the trustpoint. Select OK to proceed with the
deletion, or Cancel to revert to the last saved configuration.
RSA Key Management
Refer to the RSA Keys screen to review existing RSA key configurations that have been applied to
managed devices. If an existing key does not meet the needs of a pending certificate request,
generate a new key or import or export an existing key to and from a remote location.
Rivest, Shamir, and Adleman (RSA) is an algorithm for public key cryptography. It’s an algorithm
that can be used for certificate signing and encryption. When a device trustpoint is created, the
RSA key is the private key used with the trustpoint.
To review existing device RSA key configurations, generate additional keys or import/export keys to
and from remote locations:
1. Select Operations.
Select Certificates.
Select RSA Keys.
Protocol
Select the protocol used for exporting the target trustpoint. Available options include:
•
tftp
•
ftp
•
sftp
•
http
•
cf
•
usb1
•
usb2
•
usb3
•
usb4
Port
If using Advanced settings, use the spinner control to set the port. This option is not valid
for cf and usb1-4.
IP Address
If using Advanced settings, enter IP address of the server used to export the trustpoint.
This option is not valid for cf and usb1-4.
Hostname
If using Advanced settings, provide the hostname of the server used to export the
trustpoint. This option is not valid for cf and usb1-4.
Username/Password
These fields are enabled if using ftp or sftp protocols. Specify the username and the
password for that username to access the remote servers using these protocols.
Path
If using Advanced settings, specify the path to the trustpoint. Enter the complete relative
path to the file on the server.