Solved

Sonic Wall 3500 delete certificates

Posted on 2013-11-27
6
411 Views
Last Modified: 2013-12-19
I need to delete some expired and no longer needed certificates from this box, but they are greyed out. What do I need to do in order to delete them?
0
Comment
Question by:weburt
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 25

Accepted Solution

by:
Diverse IT earned 500 total points
ID: 39682280
Hi weburt,

If they are greyed out that means they are Built-in certificates and cannot be deleted.

What seems to be the problem? Can you provide a screenshot please?

Thanks!
0
 
LVL 25

Expert Comment

by:Diverse IT
ID: 39718628
Please respond so that I can help you! Do you have any other questions?
0
 

Author Comment

by:weburt
ID: 39718833
I finally got the issue resolved. The LDAP user to log in to LDAP has to be a member of Domain Admins. And all lower case. Thanks for the help!
0
Building an interactive eFuture classroom

Watch and learn how ATEN provided a total control system solution including seamless switching matrix switch, HDBaseT extenders, PDU, lighting control to build an interactive eFuture classroom.

 
LVL 25

Expert Comment

by:Diverse IT
ID: 39719048
How did LDAP issues have anything to do with your question about deleting expired certs? Please explain...thanks!
0
 

Author Comment

by:weburt
ID: 39728757
It was a collaborative effort.
0
 
LVL 25

Expert Comment

by:Diverse IT
ID: 39730324
It was a collaborative effort.
doesn't answer my question. I'm objecting, I clearly stated why you can't remove greyed out certificates, which is a valid answer.
0

Featured Post

NEW Veeam Agent for Microsoft Windows

Backup and recover physical and cloud-based servers and workstations, as well as endpoint devices that belong to remote users. Avoid downtime and data loss quickly and easily for Windows-based physical or public cloud-based workloads!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
In this blog we highlight approaches to managed security as a service.  We also look into ConnectWise’s value in aiding MSPs’ security management and indicate why critical alerting is a necessary integration.
In this video we outline the Physical Segments view of NetCrunch network monitor. By following this brief how-to video, you will be able to learn how NetCrunch visualizes your network, how granular is the information collected, as well as where to f…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question