Redline Communications Inc. AN100UXA Manual De Usuario
User
AN-100U/UX Base Station
Manual
70-00058-01-04
Proprietary Redline Communications © 2010
Page 115 of 136
April 19, 2010
Example #2: Operator has successfully loaded a Root CA.
AN100U#> x509 show <ENTER>
Index #0:
Subject:
C = CA, O = Redline Communications Inc, CN = Redline Communications Inc
Root CA Issuer:
C = CA, O = Redline Communications Inc, CN = Redline Communications Inc
Root CA Validity:
Not Before: Oct 28 00:00:00 2010 GMT
Not After: Oct 27 23:59:59 2040 GMT
AN100U#>
Loading x509 Certificates
Use the following procedure to add (or replace) the X.509 Root CA on the base station.
FTP Server Setup
1. An FTP server is required for all upgrades. The FTP server must be located on the
network connected to an active Ethernet port (Data or Mgmt) on the base station.
2. You must copy the X.509 certificate(s) to the default file location on the FTP server
(you can not specify a pathname in the CLI dialog).
Load Certificates on Base Station
1. Open a Telnet session to the base station.
2. Use the x509 CLI command 'add' to load the certificate. You will be prompted to
enter a username and password for the FTP server.
x509 add <FTP_IP> <CERTIFICATE_NAME>
Where,
<FTP_IP> is the IP address of your ftp server.
<CERTIFICATE_NAME> is the name of the x.509 certificate file.
Example:
user name: target
password: ******
X509LoadDownloading ...
AN100U#>
3. Use the 'show' command to confirm the x.509 certificate was successfully loaded.
x509 show
Note: Installing a certificate does not automatically activate privacy on the subscribers.
Advanced Configuration
The following table indicates the default privacy timer settings. The base station must be
rebooted to make changes effective.
rebooted to make changes effective.
Important: These settings should be modified only by network administrators having
advanced knowledge of encryption systems (see section 7.3.3: Configuring
Subscribers on page 116). Changes to these setting may cause the system to stop
exchanging data over the wireless interface.
advanced knowledge of encryption systems (see section 7.3.3: Configuring
Subscribers on page 116). Changes to these setting may cause the system to stop
exchanging data over the wireless interface.