Wireless/Redundant Edge Services xl Module Management and Configuration Guide WS.01.03 or greater
2-91
Configuring the ProCurve Wireless Services xl Module
Certificates
To fully authenticate a host, the peer must also have the CA’s certificate in its
system. This certificate includes the CA’s public key, which the peer uses to
verify the CA’s signature. A genuine CA signature attests that the holder of a
certificate is who it says it is. Your CA should also issue you a certificate
revocation list (CRL), which lists current and expired certificates of hosts that
you trust.
Because a host can freely distribute its public key, it can authenticate itself to
anyone who trusts its CA. However, no one can pose as the host because only
the host’s unshared, private key can encrypt and “sign” the certificate.
The Wireless Edge Services xl Module supports certificates. You can create a
self-signed certificate, request a certificate from a CA, or upload a CA certifi-
cate. After you make changes to the module’s certificate, you must restart the
HTTPS service.
Creating a Self-Signed Certificate
Because managing certificates that are generated by a CA can be time inten-
sive, you may opt to create a self-signed certificate. To create this certificate,
complete the following steps:
1. Click Management > Server Certificates.
2. Click the Create Self-Sign. . . button at the bottom of the screen.