D-Link DWS-1008 Product Manual - Page 280

Choosing the Appropriate Certificate Installation Method for Your Network

Page 280 highlights

Choosing the Appropriate Certificate Installation Method for Your Network Depending on your network environment, you can use any of the following methods to install certificates and their public-private key pairs. The methods differ in terms of simplicity and security. The simplest method is also the least secure, while the most secure method is slightly more complex to use. • Self-signed certificate-The easiest method to use because a CA server is not required. The switch generates and signs the certificate itself. This method is the simplest but is also the least secure, because the certificate is not validated (signed) by a CA. • PKCS #12 object file certificate-More secure than using self-signed certificates, but slightly less secure than using a Certificate Signing Request (CSR), because the private key is distributed in a file from the CA instead of generated by the switch itself. The PKCS #12 object file is more complex to deal with than self-signed certificates. However, you can use Web View or the CLI to distribute this certificate. The other two methods can be performed only using the CLI. • Certificate Signing Request (CSR)-The most secure method, because the switch's public and private keys are created on the switch itself, while the certificate comes from a trusted source (CA). This method requires generating the key pair, creating a CSR and sending it to the CA, cutting and pasting the certificate signed by the CA into the CLI, and then cutting and pasting the CA's own certificate into the CLI. The table below lists the steps required for each method and refers you to appropriate instructions. Certificate Installation Method Self-signed certificate PKCS #12 object file certificate Certificate Signing Request (CSR) certificate Steps Required Instructions 1. Generate a public-private key pair on • "Creating Public-Private Key Pairs" the switch. • "Generating Self-Signed Certificates" 2. Generate a self-signed certificate on the switch. 1. Copy a PKCS #12 object file (public- "Installing a Key Pair and Certificate private key pair, server certificate, and from a PKCS #12 Object File" CA certificate) from a CA onto the switch. 2. Enter the one-time password to unlock the file. 3. Unpack the file into the switch's certificate and key store. 1. Generate a public-private key pair on • "Creating Public-Private Key Pairs" the switch. • "Creating a CSR and Installing a 2. Generate a CSR on the switch as a Certificate from a PKCS #7 Object PKCS #10 object file. File" 3. Give the CSR to a CA and receive a • "Installing a CA's Own Certificate" signed certificate (a PEM-encoded PKCS #7 object file). 4. Paste the PEM-encoded file into the CLI to store the certificate on the switch. 5. Obtain and install the CA's own certificate. D-Link DWS-1008 User Manual 261

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502

D-Link DWS-1008 User Manual
±µ1
Choosing the Appropriate Certificate Installation
Method for Your Network
Depending on your network environment, you can use any of the following methods to install certificates
and their public-private key pairs. The methods differ in terms of simplicity and security. The simplest
method is also the least secure, while the most secure method is slightly more complex to use.
• Self-signed certificate—The easiest method to use because a CA server is not required.
The switch generates and signs the certificate itself. This method is the simplest but is also
the least secure, because the certificate is not validated (signed) by a CA.
• PKCS #12 object file certificate—More secure than using self-signed certificates, but
slightly less secure than using a Certificate Signing Request (CSR), because the private
key is distributed in a file from the CA instead of generated by the switch itself. The PKCS
#12 object file is more complex to deal with than self-signed certificates. However, you
can use Web View or the CLI to distribute this certificate. The other two methods can be
performed only using the CLI.
• Certificate Signing Request (CSR)—The most secure method, because the switch’s public
and private keys are created on the switch itself, while the certificate comes from a trusted
source (CA). This method requires generating the key pair, creating a CSR and sending
it to the CA, cutting and pasting the certificate signed by the CA into the CLI, and then
cutting and pasting the CA’s own certificate into the CLI.
The table below lists the steps required for each method and refers you to appropriate instructions.
Certificate Installation Method
Steps Required
Instructions
Self-signed certificate
1. Generate a public-private key pair on
the switch.
2. Generate a self-signed certificate on
the switch.
• “Creating Public-Private Key Pairs”
• “Generating Self-Signed Certificates”
PKCS #12 object file certificate
1. Copy a PKCS #12 object file (public-
private key pair, server certificate, and
CA certificate) from a CA onto the
switch.
2. Enter the one-time password to
unlock the file.
3. Unpack the file into the switch’s
certificate and key store.
“Installing a Key Pair and Certificate
from a PKCS #12 Object File”
Certificate Signing Request
(CSR) certificate
1. Generate a public-private key pair on
the switch.
2. Generate a CSR on the switch as a
PKCS #10 object file.
3. Give the CSR to a CA and receive a
signed certificate (a PEM-encoded
PKCS #7 object file).
4. Paste the PEM-encoded file into the
CLI to store the certificate on the
switch.
5. Obtain and install the CA’s own
certificate.
• “Creating Public-Private Key Pairs”
• “Creating a CSR and Installing a
Certificate from a PKCS #7 Object
File”
• “Installing a CA’s Own Certificate”