Home > Motorola > Wireless > Motorola Wing 5 Manual

Motorola Wing 5 Manual

    Download as PDF Print this page Share this page

    Have a look at the manual Motorola Wing 5 Manual online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 249 Motorola manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 1128
    							PRIVILEGED EXEC MODE COMMANDS 3 - 29
    • crypto pki authenticate   {background {on }|
    on }
    • crypto pki request [generate-rsa-key|use-rsa-key]  
    autogen-subject-name [|email |fqdn |
    ip-address ]
    zeroise rsa 
    Deletes a specified RSA Keypair
      – Specify the RSA Keypair name.
    force {on } Optional. Forces deletion of all certificates associated with the RSA Keypair
     on  – Optional. Forces deletion of all certificates on a specified 
    device
      – Specify the name of the AP or wireless controller.
    pki Enables Private Key Infrastructure (PKI) management. Use this command to 
    authenticate, export, generate, or delete a trustpoint and its associated Certificate 
    Authority (CA) certificates.
    authenticate 
    Authenticates a CA certificate
      – Specify the trustpoint name.
     Specify the CA certificate location in the following format:
    tftp://[:port]/path/file
    ftp://:@[:port]/path/file
    sftp://@[:port]>/path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file
    background 
    {on }Optional. Performs authentication in the background
     on  – Optional. Performs authentication on a specified device
      – Specify the name of the AP or wireless controller.
    on  Optional. Performs authentication on a specified device
      – Specify the name of the AP or wireless controller.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    request Sends a Certificate Signing Request (CSR) to the CA for digital identity certificate. The 
    CSR contains the applicant’s details and the RSA Keypair’s public key.
    [generate-rsa-key|
    use-rsa-key] 
    Generates a new RSA Keypair or uses an existing RSA Keypair
     generate-rsa-key – Generates a new RSA Keypair for digital authentication
     use-rsa-key – Uses an existing RSA Keypair for digital authentication
      – If generating a new RSA Keypair, specify a name for it.
    If an existing RSA Keypair, specify its name.
    autogen-subject-name Auto generates the subject name from configuration parameters. The subject name 
    helps to identify the certificate. 
    						
    							3 - 30 WiNG CLI Reference Guide
    • crypto pki request [generate-rsa-key|use-rsa-key]  
    subject-name     
    [, email , fqdn , ip-address 
     
    {background {on /path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file
     background – Optional. Performs the export operation in the background
     on  – Optional. Performs the export operation on a specified 
    device
      – Specify the name of the AP or wireless controller.
    email  Exports CSR to a specified e-mail address
      – Specify the e-mail address of the CA.
    fqdn  Exports CSR to a specified Fully Qualified Domain Name (FQDN)
      – Specify the FQDN of the CA.
    ip address  Exports CSR to a specified device or system
      – Specify the IP address of the CA.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    request Sends a CSR to the CA for digital identity certificate. The CSR contains the applicant’s 
    details and the RSA Keypair’s public key
    [generate-rsa-key|
    use-rsa-key] 
    Generates a new RSA Keypair, or uses an existing RSA Keypair
     generate-rsa-key – Generates a new RSA Keypair for digital authentication
     use-rsa-key – Uses an existing RSA Keypair for digital authentication
      – If generating a new RSA Keypair, specify a name for it.
    If using an existing RSA Keypair, specify its name.
    subject-name 
    Specify a subject name to identify the certificate.
      – Specify the common name used with the CA certificate. The 
    name should enable you to identify the certificate easily.
     Sets the deployment country name (2 character ISO code)
     Sets the state name (2 to 64 characters)
     Sets the city name (2 to 64 characters)
     Sets the organization name (2 to 64 characters)
     Sets the organization unit (2 to 64 characters) 
    						
    							PRIVILEGED EXEC MODE COMMANDS 3 - 31
    • crypto pki trustpoint   {background {on }|on |passphrase  background {on }|
    on }}
     
    {background {on /path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file
     background – Optional. Performs the export operation in the background
     on  – Optional. Performs the export operation on a specified 
    device
      – Specify the name of the AP or wireless controller.
    email  Exports CSR to a specified e-mail address
      – Specify the e-mail address of the CA.
    fqdn  Exports CSR to a specified FQDN
     Specify the FQDN of the CA.
    ip address  Exports the CSR to a specified device or system
     Specify the IP address of the CA.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    trustpoint 
    Exports trustpoint CA certificate, Certificate Revocation List (CRL), server certificate, 
    and private key
      – Specify the trustpoint name.
     Specify the destination address in the following format:
    tftp://[:port]/path/file
    ftp://:@[:port]/path/file
    sftp://@[:port]>/path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file
    background 
    {on-DEVICE-NAME>}Optional. Performs the export operation in the background
     on  – Optional. Performs the export operation on a specified 
    device
      – Specify the name of the AP or wireless controller. 
    						
    							3 - 32 WiNG CLI Reference Guide
    • crypto pki generate self-signed  [generate-rsa-key|
    use-rsa-key]  autogen-subject-name {email |
    fqdn |ip-address |on }
    • crypto pki generate self-signed  [generate-rsa-key|
    use-rsa-key]  subject-name   
        {email |
    fqdn |ip-address |on }
    on  Optional. Performs the export operation on a specified device
      – Specify the name of the AP or wireless controller.
    passphrase 
     
    {background {on }|
    on Optional. Encrypts key with a passphrase before exporting it
      – Specify the passphrase.
     background – Optional. Performs the export operation in the background
     on  – Optional. Performs the export operation on a specified
    device
      – Specify the name of the AP or wireless controller.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    generate Generates a CA certificate and a trustpoint
    self-signed 
    Generates a self-signed CA certificate and a trustpoint
      – Specify a name for the certificate and its trustpoint.
    [generate-rsa-key|
    use-rsa-key] 
    Generates a new RSA Keypair, or uses an existing RSA Keypair
     generate-rsa-key – Generates a new RSA Keypair for digital authentication
     use-rsa-key – Uses an existing RSA Keypair for digital authentication
      – If generating a new RSA Keypair, specify a name for
    it. If using an existing RSA Keypair, specify its name.
    autogen-subject-name Auto generates the subject name from configuration parameters. The subject name 
    helps to identify the certificate.
    email  Exports CSR to a specified e-mail address
      – Specify the e-mail address of the CA.
    fqdn  Exports CSR to a specified FQDN
      – Specify the FQDN of the CA.
    ip-address  Exports CSR to a specified device or system
      – Specify the IP address of the CA.
    on  Exports the CSR on a specified device
      – Specify the name of the AP or wireless controller.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    generate Generates a CA certificate and a trustpoint
    self-signed 
    Generates a self-signed CA certificate and a trustpoint
      – Specify a name for the certificate and its trustpoint. 
    						
    							PRIVILEGED EXEC MODE COMMANDS 3 - 33
    •  crypto pki import [certificate|crl]   {background 
    {on }|on }
    [generate-rsa-key|use-rsa-
    key] Generates a new RSA Keypair, or uses an existing RSA Keypair
     generate-rsa-key – Generates a new RSA Keypair for digital authentication
     use-rsa-key – Uses an existing RSA Keypair for digital authentication
      – If generating a new RSA Keypair, specify a name for it.
    If using an existing RSA Keypair, specify its name.
    subject-name 
    Enter a subject name to identify the certificate.
      – Specify the common name used with the CA certificate. The 
    name should enable you to identify the certificate easily.
     Sets the deployment country name (2 character ISO code)
     Sets the state name (2 to 64 characters)
     Sets the city name (2 to 64 characters)
     Sets the organization name (2 to 64 characters)
     Sets the organization unit (2 to 64 characters)
    email  Exports CSR to a specified e-mail address
      – Specify the e-mail address of the CA.
    fqdn  Exports CSR to a specified FQDN
      – Specify the FQDN of the CA.
    ip address  Exports the CSR to a specified device or system
      – Specify the IP address of the CA.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    import Imports certificates, CRL, or a trustpoint to a selected device
    [certificate|crl] 
    Imports a signed server certificate or a certificate revocation list
     certificate – Imports a signed server certificate
     crl – Imports a CRL
      – Specify the trustpoint name (should be authenticated).
     Specify the signed server certificate or CRL source address in the following format:
    tftp://[:port]/path/file
    ftp://:@[:port]/path/file
    sftp://@[:port]>/path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file 
    						
    							3 - 34 WiNG CLI Reference Guide
    • crypto pki import trustpoint   {background {on 
    }|on }
    • crypto pki zeroise trustpoint  {del-key {on }|
    on }
    background 
    {on }Optional. Performs the import operation in the background
     on  – Optional. Performs the import operation on a specified device
      – Specify the name of the AP or wireless controller.
    on  Optional. Performs the import operation on a specified device
      – Enter the name of the AP or wireless controller.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates.
    import Imports certificates, CRL, or a trustpoint to the selected device
    trustpoint 
    Imports a trustpoint and its associated CA certificate, server certificate, and private 
    key
      – Specify the trustpoint name (should be authenticated).
     Specify the trustpoint source address in the following format:
    tftp://[:port]/path/file
    ftp://:@[:port]/path/file
    sftp://@[:port]>/path/file
    http://[:port]/path/file
    cf:/path/file
    usb1:/path/file
    usb2:/path/file
    background 
    {on }Optional. Performs the import operation in the background
     on  – Optional. Performs the import operation on a specified device
      – Specify the name of the AP or wireless controller.
    on  Optional. Performs the import operation on a specified device
      – Specify the name of the AP or wireless controller.
    passphrase 
     
    {background {on }|
    on }Optional. Encrypts trustpoint with a passphrase before importing it
      – Specify a passphrase.
     background – Optional. Imports encrypted trustpoint in the background
     on  – Optional. Imports encrypted trustpoint on a specified
    device
      – Specify the name of the AP or wireless controller.
    pki Enables PKI management. Use this command to authenticate, export, generate, or 
    delete a trustpoint and its associated CA certificates
    zeroise 
    Deletes a trustpoint and its associated CA certificate, server certificate, and private key
      – Specify the trustpoint name. 
    						
    							PRIVILEGED EXEC MODE COMMANDS 3 - 35
    Examples
    rfs7000-37FABE#crypto key generate rsa key 1025
    RSA Keypair successfully generated
    rfs7000-37FABE#
    rfs7000-37FABE#crypto key import rsa moto123 url passphrase word background on 
    rfs7000-37FABE
    RSA key import operation is started in background
    rfs7000-37FABE#
    rfs7000-37FABE#crypto pki generate self-signed word generate-rsa-key word autogen-
    subject-name fqdn word
    Successfully generated self-signed certificate
    rfs7000-37FABE#
    rfs7000-37FABE#crypto pki zeroize trustpoint word del-key on rfs7000-37FABE
    Successfully removed the trustpoint and associated certificates
    %Warning: Applications associated with the trustpoint will start using default-
    trustpoint
    rfs7000-37FABE#
    rfs7000-37FABE#crypto pki authenticate word url background on rfs7000-37FABE
    Import of CA certificate started in background
    rfs7000-37FABE#
    rfs7000-37FABE#crypto pki import trustpoint word url passphrase word on rfs7000-37FABE
    Import operaton started in background
    rfs7000-37FABE#
    Related Commands
    del-key 
    {on }Optional. Deletes the private key associated with the server certificate
     on  – Optional. Deletes the private key on a specified device
      – Enter the name of the AP or wireless controller.
    on  Optional. Deletes trustpoint on a specified device
      – Specify the name of the AP or wireless controller.
    noResets or disables the crypto commands 
    						
    							3 - 36 WiNG CLI Reference Guide
    3.1.13 delete
    Privileged Exec Mode Commands
    Deletes a specified file from the device’s file system
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    delete [/force |/recursive |]
    Parameters
    • delete [/force |/recursive |]
    Examples
    rfs7000-37FABE#delete flash:/out.tar flash:/out.tar.gz
    Delete flash:/out.tar [y/n]? y
    Delete flash:/out.tar.gz [y/n]? y
    rfs7000-37FABE#delete /force flash:/tmp.txt
    rfs7000-37FABE#
    rfs7000-37FABE#delete /recursive flash:/backup/
    Delete flash:/backup//fileMgmt_350_180B.core 
    [y/n]? y
    Delete 
    flash:/backup//fileMgmt_350_18212X.core_bk 
    [y/n]? n
    Delete flash:/backup//imish_1087_18381X.core.gz 
    [y/n]? n
    rfs7000-37FABE#
    /force Forces deletion without a prompt
    /recursive Performs a recursive delete
     Specifies the filenames to delete 
    						
    							PRIVILEGED EXEC MODE COMMANDS 3 - 37
    3.1.14 disable
    Privileged Exec Commands
    Turns off (disables) the privileged mode command set. This command returns to the User Executable mode.
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    disable
    Parameters
    None
    Examples
    rfs7000-37FABE#disable
    rfs7000-37FABE> 
    						
    							3 - 38 WiNG CLI Reference Guide
    3.1.15 diff
    Privileged Exec Mode Commands
    Displays the differences between two files on a device’s file system or a particular URL
    Supported in the following platforms:
     AP300
     AP621
     AP650
     AP6511
     AP6521
     AP6532
     AP71XX
     RFS4000
     RFS6000
     RFS7000
     NX9000
     NX9500
    Syntax
    diff [|] [|]
    Parameters
    • diff [|] [|]
    Examples
    rfs7000-37FABE#diff startup-config running-config
    --- startup-config
    +++ running-config
    @@ -1,3 +1,4 @@
    +!### show running-config
     !
     ! Configuration of RFS7000 version 5.2.0.0-048B
     !
    @@ -80,7 +81,6 @@
      excluded-address 172.16.10.9 172.16.10.10
      bootp ignore
     !
    -gui default
     !
     firewall-policy default
     !
    rfs7000-37FABE#
    FILE The first  is the source file for the diff. The second  is the file to compare it 
    with.
    URL The first  is the source URL for the file for the diff. The second  is the URL 
    of the file to compare it with. 
    						
    All Motorola manuals Comments (0)