2015-01-12 18:32:39 +01:00
|
|
|
|
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
Creating SSL certificates to test AC-Tube and it's WTP's
|
|
|
|
========================================================
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2014-08-18 08:05:56 +02:00
|
|
|
1. Create a root CA by executing:
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
./mkrootca.sh
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
This creates some root CAs and intermediate CAs in the
|
|
|
|
subdirectories ./root-ca and ./intermediate-ca to sign
|
|
|
|
certificates.
|
2014-08-18 08:03:39 +02:00
|
|
|
|
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
2. Create client certificates as needed
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
To create a client certificate, execute the script
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
./mkcert.sh <cert-name> [type]
|
2014-08-18 08:03:39 +02:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
where cert-name is the name of the certificate to be created
|
|
|
|
without extension and the optional parameter type specifies
|
|
|
|
the type of the certificate, which could be only 'cisco'
|
|
|
|
for now.
|
|
|
|
The created certificatte and key is found in the
|
|
|
|
folder ./certs
|
|
|
|
named cert-name.pem and cert-name.key.
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-02-03 08:20:28 +01:00
|
|
|
If you chose 'cisco-ap' as type, the certificate will be
|
2015-01-24 08:49:41 +01:00
|
|
|
accepted by a Cisco WTP when used in AC-Tube. The firmare
|
|
|
|
on Cisco's AP must be at least 7.3.
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
EXAMPLE:
|
2016-03-01 09:31:16 +01:00
|
|
|
./mkcert.sh ac-cisco cisco-ap
|
2015-01-24 08:49:41 +01:00
|
|
|
will create the files ./certs/ac-cisco.pem and and ./certs/ac-cisco.key
|
2015-02-01 13:35:16 +01:00
|
|
|
|
|
|
|
On a Cisco AP you might have to reset the config over terminal,
|
|
|
|
before it will connet. Therefor do in enabeled mode:
|
|
|
|
clear capwap private-config
|
|
|
|
reload
|
|
|
|
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
3. Put these entries into ac.conf located in the ac directory,
|
|
|
|
so AC-Tube wilil use the certificates. If you have named your certificate
|
|
|
|
just 'ac', put the following into config:
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
ssl_key=../../ssl/certs/ac.key
|
|
|
|
ssl_cert=../../ssl/certs/ac.crt
|
2015-01-12 18:32:39 +01:00
|
|
|
|
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
Installing your own root ca an a Cisco WTP
|
|
|
|
==========================================
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
If you want to connect a Cisco 1130 series LAP to AC-Tube
|
|
|
|
using a certificate signed by a root ca of your choice, you
|
|
|
|
have to install the CA file on the WTP. Therofore you can
|
|
|
|
create a terminal script by executing:
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
./mkciscoimport.sh
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
Paste the result into a terminal session when in enabled mode.
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
To ac.conf add the following entry:
|
|
|
|
|
|
|
|
dtls_verify_peer = no
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2015-01-24 08:49:41 +01:00
|
|
|
But remember, if you reboot the WTP the installed CA will be lost.
|
|
|
|
Currently there is no way to make the installation permanent.
|
2015-01-12 18:32:39 +01:00
|
|
|
|
2014-08-18 08:03:39 +02:00
|
|
|
|
|
|
|
If you experience with other Cisco LAPs (e.g. 1141), please tell me.
|
|
|
|
7u83@mail.ru.
|
|
|
|
|
|
|
|
|