Motorola Wing 5 Manual
Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
PRIVILEGED EXEC MODE COMMANDS 3 - 29 • crypto pki authenticate {background {on }| on } • crypto pki request [generate-rsa-key|use-rsa-key] autogen-subject-name [|email |fqdn | ip-address ] zeroise rsa Deletes a specified RSA Keypair – Specify the RSA Keypair name. force {on } Optional. Forces deletion of all certificates associated with the RSA Keypair on – Optional. Forces deletion of all certificates on a specified device – Specify the name of the AP or wireless controller. pki Enables Private Key Infrastructure (PKI) management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated Certificate Authority (CA) certificates. authenticate Authenticates a CA certificate – Specify the trustpoint name. Specify the CA certificate location in the following format: tftp://[:port]/path/file ftp://:@[:port]/path/file sftp://@[:port]>/path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background {on }Optional. Performs authentication in the background on – Optional. Performs authentication on a specified device – Specify the name of the AP or wireless controller. on Optional. Performs authentication on a specified device – Specify the name of the AP or wireless controller. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The CSR contains the applicant’s details and the RSA Keypair’s public key. [generate-rsa-key| use-rsa-key] Generates a new RSA Keypair or uses an existing RSA Keypair generate-rsa-key – Generates a new RSA Keypair for digital authentication use-rsa-key – Uses an existing RSA Keypair for digital authentication – If generating a new RSA Keypair, specify a name for it. If an existing RSA Keypair, specify its name. autogen-subject-name Auto generates the subject name from configuration parameters. The subject name helps to identify the certificate.
3 - 30 WiNG CLI Reference Guide • crypto pki request [generate-rsa-key|use-rsa-key] subject-name [, email , fqdn , ip-address {background {on /path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background – Optional. Performs the export operation in the background on – Optional. Performs the export operation on a specified device – Specify the name of the AP or wireless controller. email Exports CSR to a specified e-mail address – Specify the e-mail address of the CA. fqdn Exports CSR to a specified Fully Qualified Domain Name (FQDN) – Specify the FQDN of the CA. ip address Exports CSR to a specified device or system – Specify the IP address of the CA. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. request Sends a CSR to the CA for digital identity certificate. The CSR contains the applicant’s details and the RSA Keypair’s public key [generate-rsa-key| use-rsa-key] Generates a new RSA Keypair, or uses an existing RSA Keypair generate-rsa-key – Generates a new RSA Keypair for digital authentication use-rsa-key – Uses an existing RSA Keypair for digital authentication – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Specify a subject name to identify the certificate. – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. Sets the deployment country name (2 character ISO code) Sets the state name (2 to 64 characters) Sets the city name (2 to 64 characters) Sets the organization name (2 to 64 characters) Sets the organization unit (2 to 64 characters)
PRIVILEGED EXEC MODE COMMANDS 3 - 31 • crypto pki trustpoint {background {on }|on |passphrase background {on }| on }} {background {on /path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background – Optional. Performs the export operation in the background on – Optional. Performs the export operation on a specified device – Specify the name of the AP or wireless controller. email Exports CSR to a specified e-mail address – Specify the e-mail address of the CA. fqdn Exports CSR to a specified FQDN Specify the FQDN of the CA. ip address Exports the CSR to a specified device or system Specify the IP address of the CA. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. trustpoint Exports trustpoint CA certificate, Certificate Revocation List (CRL), server certificate, and private key – Specify the trustpoint name. Specify the destination address in the following format: tftp://[:port]/path/file ftp://:@[:port]/path/file sftp://@[:port]>/path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background {on-DEVICE-NAME>}Optional. Performs the export operation in the background on – Optional. Performs the export operation on a specified device – Specify the name of the AP or wireless controller.
3 - 32 WiNG CLI Reference Guide • crypto pki generate self-signed [generate-rsa-key| use-rsa-key] autogen-subject-name {email | fqdn |ip-address |on } • crypto pki generate self-signed [generate-rsa-key| use-rsa-key] subject-name {email | fqdn |ip-address |on } on Optional. Performs the export operation on a specified device – Specify the name of the AP or wireless controller. passphrase {background {on }| on Optional. Encrypts key with a passphrase before exporting it – Specify the passphrase. background – Optional. Performs the export operation in the background on – Optional. Performs the export operation on a specified device – Specify the name of the AP or wireless controller. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint self-signed Generates a self-signed CA certificate and a trustpoint – Specify a name for the certificate and its trustpoint. [generate-rsa-key| use-rsa-key] Generates a new RSA Keypair, or uses an existing RSA Keypair generate-rsa-key – Generates a new RSA Keypair for digital authentication use-rsa-key – Uses an existing RSA Keypair for digital authentication – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. autogen-subject-name Auto generates the subject name from configuration parameters. The subject name helps to identify the certificate. email Exports CSR to a specified e-mail address – Specify the e-mail address of the CA. fqdn Exports CSR to a specified FQDN – Specify the FQDN of the CA. ip-address Exports CSR to a specified device or system – Specify the IP address of the CA. on Exports the CSR on a specified device – Specify the name of the AP or wireless controller. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. generate Generates a CA certificate and a trustpoint self-signed Generates a self-signed CA certificate and a trustpoint – Specify a name for the certificate and its trustpoint.
PRIVILEGED EXEC MODE COMMANDS 3 - 33 • crypto pki import [certificate|crl] {background {on }|on } [generate-rsa-key|use-rsa- key] Generates a new RSA Keypair, or uses an existing RSA Keypair generate-rsa-key – Generates a new RSA Keypair for digital authentication use-rsa-key – Uses an existing RSA Keypair for digital authentication – If generating a new RSA Keypair, specify a name for it. If using an existing RSA Keypair, specify its name. subject-name Enter a subject name to identify the certificate. – Specify the common name used with the CA certificate. The name should enable you to identify the certificate easily. Sets the deployment country name (2 character ISO code) Sets the state name (2 to 64 characters) Sets the city name (2 to 64 characters) Sets the organization name (2 to 64 characters) Sets the organization unit (2 to 64 characters) email Exports CSR to a specified e-mail address – Specify the e-mail address of the CA. fqdn Exports CSR to a specified FQDN – Specify the FQDN of the CA. ip address Exports the CSR to a specified device or system – Specify the IP address of the CA. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to a selected device [certificate|crl] Imports a signed server certificate or a certificate revocation list certificate – Imports a signed server certificate crl – Imports a CRL – Specify the trustpoint name (should be authenticated). Specify the signed server certificate or CRL source address in the following format: tftp://[:port]/path/file ftp://:@[:port]/path/file sftp://@[:port]>/path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file
3 - 34 WiNG CLI Reference Guide • crypto pki import trustpoint {background {on }|on } • crypto pki zeroise trustpoint {del-key {on }| on } background {on }Optional. Performs the import operation in the background on – Optional. Performs the import operation on a specified device – Specify the name of the AP or wireless controller. on Optional. Performs the import operation on a specified device – Enter the name of the AP or wireless controller. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates. import Imports certificates, CRL, or a trustpoint to the selected device trustpoint Imports a trustpoint and its associated CA certificate, server certificate, and private key – Specify the trustpoint name (should be authenticated). Specify the trustpoint source address in the following format: tftp://[:port]/path/file ftp://:@[:port]/path/file sftp://@[:port]>/path/file http://[:port]/path/file cf:/path/file usb1:/path/file usb2:/path/file background {on }Optional. Performs the import operation in the background on – Optional. Performs the import operation on a specified device – Specify the name of the AP or wireless controller. on Optional. Performs the import operation on a specified device – Specify the name of the AP or wireless controller. passphrase {background {on }| on }Optional. Encrypts trustpoint with a passphrase before importing it – Specify a passphrase. background – Optional. Imports encrypted trustpoint in the background on – Optional. Imports encrypted trustpoint on a specified device – Specify the name of the AP or wireless controller. pki Enables PKI management. Use this command to authenticate, export, generate, or delete a trustpoint and its associated CA certificates zeroise Deletes a trustpoint and its associated CA certificate, server certificate, and private key – Specify the trustpoint name.
PRIVILEGED EXEC MODE COMMANDS 3 - 35 Examples rfs7000-37FABE#crypto key generate rsa key 1025 RSA Keypair successfully generated rfs7000-37FABE# rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on rfs7000-37FABE RSA key import operation is started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen- subject-name fqdn word Successfully generated self-signed certificate rfs7000-37FABE# rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE Successfully removed the trustpoint and associated certificates %Warning: Applications associated with the trustpoint will start using default- trustpoint rfs7000-37FABE# rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE Import of CA certificate started in background rfs7000-37FABE# rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE Import operaton started in background rfs7000-37FABE# Related Commands del-key {on }Optional. Deletes the private key associated with the server certificate on – Optional. Deletes the private key on a specified device – Enter the name of the AP or wireless controller. on Optional. Deletes trustpoint on a specified device – Specify the name of the AP or wireless controller. noResets or disables the crypto commands
3 - 36 WiNG CLI Reference Guide 3.1.13 delete Privileged Exec Mode Commands Deletes a specified file from the device’s file system Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax delete [/force |/recursive |] Parameters • delete [/force |/recursive |] Examples rfs7000-37FABE#delete flash:/out.tar flash:/out.tar.gz Delete flash:/out.tar [y/n]? y Delete flash:/out.tar.gz [y/n]? y rfs7000-37FABE#delete /force flash:/tmp.txt rfs7000-37FABE# rfs7000-37FABE#delete /recursive flash:/backup/ Delete flash:/backup//fileMgmt_350_180B.core [y/n]? y Delete flash:/backup//fileMgmt_350_18212X.core_bk [y/n]? n Delete flash:/backup//imish_1087_18381X.core.gz [y/n]? n rfs7000-37FABE# /force Forces deletion without a prompt /recursive Performs a recursive delete Specifies the filenames to delete
PRIVILEGED EXEC MODE COMMANDS 3 - 37 3.1.14 disable Privileged Exec Commands Turns off (disables) the privileged mode command set. This command returns to the User Executable mode. Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax disable Parameters None Examples rfs7000-37FABE#disable rfs7000-37FABE>
3 - 38 WiNG CLI Reference Guide 3.1.15 diff Privileged Exec Mode Commands Displays the differences between two files on a device’s file system or a particular URL Supported in the following platforms: AP300 AP621 AP650 AP6511 AP6521 AP6532 AP71XX RFS4000 RFS6000 RFS7000 NX9000 NX9500 Syntax diff [|] [|] Parameters • diff [|] [|] Examples rfs7000-37FABE#diff startup-config running-config --- startup-config +++ running-config @@ -1,3 +1,4 @@ +!### show running-config ! ! Configuration of RFS7000 version 5.2.0.0-048B ! @@ -80,7 +81,6 @@ excluded-address 172.16.10.9 172.16.10.10 bootp ignore ! -gui default ! firewall-policy default ! rfs7000-37FABE# FILE The first is the source file for the diff. The second is the file to compare it with. URL The first is the source URL for the file for the diff. The second is the URL of the file to compare it with.