Solved

Sonic Wall 3500 delete certificates

Posted on 2013-11-27
6
386 Views
Last Modified: 2013-12-19
I need to delete some expired and no longer needed certificates from this box, but they are greyed out. What do I need to do in order to delete them?
0
Comment
Question by:weburt
  • 4
  • 2
6 Comments
 
LVL 25

Accepted Solution

by:
Diverse IT earned 500 total points
ID: 39682280
Hi weburt,

If they are greyed out that means they are Built-in certificates and cannot be deleted.

What seems to be the problem? Can you provide a screenshot please?

Thanks!
0
 
LVL 25

Expert Comment

by:Diverse IT
ID: 39718628
Please respond so that I can help you! Do you have any other questions?
0
 

Author Comment

by:weburt
ID: 39718833
I finally got the issue resolved. The LDAP user to log in to LDAP has to be a member of Domain Admins. And all lower case. Thanks for the help!
0
Efficient way to get backups off site to Azure

This user guide provides instructions on how to deploy and configure both a StoneFly Scale Out NAS Enterprise Cloud Drive virtual machine and Veeam Cloud Connect in the Microsoft Azure Cloud.

 
LVL 25

Expert Comment

by:Diverse IT
ID: 39719048
How did LDAP issues have anything to do with your question about deleting expired certs? Please explain...thanks!
0
 

Author Comment

by:weburt
ID: 39728757
It was a collaborative effort.
0
 
LVL 25

Expert Comment

by:Diverse IT
ID: 39730324
It was a collaborative effort.
doesn't answer my question. I'm objecting, I clearly stated why you can't remove greyed out certificates, which is a valid answer.
0

Featured Post

Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question