Cisco CX-FEIP-1TX= Installation and con?guration User's Guide Page 463

  • Download
  • Add to my manuals
  • Print
  • Page
    / 648
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 462
PTP 800 Series User Guide Task 5: Configuring security
phn-2513_004v000 (Oct 2012)
6-35
Step 1: Enter key of keys
Erasing or changing the keys of keys erases all critical security parameters (CSPs).
The Step 1: Enter Key of Keys page is displayed (Figure 123). Enter the generated key of
keys in both the Key Of Keys and Confirm Key Of Keys fields. Select Next.
Figure 123 Step 1: Enter Key of Keys page
Step 2: TLS private key and public certificate
If the certificates expire, the unit will be unreachable. If this occurs, put the unit into
recovery mode and erase all configuration. For more information, refer to Using recovery
mode on page 7-71.
The Step 2: TLS Private Key and Public Certificate page is displayed (Figure 124).
If a valid TLS private key exists, then an SHA-1 thumbprint of the key is displayed. If this
key is correct, then take no action. Otherwise, select Browse and select the generated
private key file (.der).
If a valid TLS public certificate exists, then an SHA-1 thumbprint of the certificate is
displayed. If this certificate is correct, then take no action. Otherwise, select Browse and
select the generated certificate file (.der).
Select Next.
Page view 462
1 ... 462 463 464 ... 648

Comments to this Manuals

No comments