Updated documentation.
FossilOrigin-Name: de2b8575d9dcc961dee75f8c9c06c6739a0f88d6e81e071534e9e5a6e0ca0817
This commit is contained in:
parent
43c4e29e92
commit
9a9c4ec4e9
117
ssl/README
117
ssl/README
@ -1,99 +1,66 @@
|
|||||||
|
|
||||||
|
|
||||||
Creating ssl certificates to test AC-Tube and it's WTP
|
Creating SSL certificates to test AC-Tube and it's WTP's
|
||||||
======================================================
|
========================================================
|
||||||
|
|
||||||
1. Create a root CA by executing:
|
1. Create a root CA by executing:
|
||||||
|
|
||||||
./mkrootca
|
./mkrootca.sh
|
||||||
|
|
||||||
This creates the files root-ca.crt and root-ca.key.
|
This creates some root CAs and intermediate CAs in the
|
||||||
|
subdirectories ./root-ca and ./intermediate-ca to sign
|
||||||
|
certificates.
|
||||||
|
|
||||||
|
|
||||||
2. Create client certificates for AC and WTP
|
2. Create client certificates as needed
|
||||||
|
|
||||||
./mkcerts
|
To create a client certificate, execute the script
|
||||||
|
|
||||||
|
./mkcert.sh <cert-name> [type]
|
||||||
|
|
||||||
|
where cert-name is the name of the certificate to be created
|
||||||
|
without extension and the optional parameter type specifies
|
||||||
|
the type of the certificate, which could be only 'cisco'
|
||||||
|
for now.
|
||||||
|
The created certificatte and key is found in the
|
||||||
|
folder ./certs
|
||||||
|
named cert-name.pem and cert-name.key.
|
||||||
|
|
||||||
|
If you chose 'cisco' as type, the certificate will be
|
||||||
|
accepted by a Cisco WTP when used in AC-Tube. The firmare
|
||||||
|
on Cisco's AP must be at least 7.3.
|
||||||
|
|
||||||
|
EXAMPLE:
|
||||||
|
./mkcert ac-cisco cisco
|
||||||
|
will create the files ./certs/ac-cisco.pem and and ./certs/ac-cisco.key
|
||||||
|
|
||||||
This will create the files ac.key, ac.crt and wtp.crt, wtp.key.
|
|
||||||
All .key files are protected with the password you have chosen
|
|
||||||
in the certificate creation process.
|
|
||||||
|
|
||||||
3. Put these entries into ac.conf located in the ac directory,
|
3. Put these entries into ac.conf located in the ac directory,
|
||||||
so AC-Tube wilil use the certificates:
|
so AC-Tube wilil use the certificates. If you have named your certificate
|
||||||
|
just 'ac', put the following into config:
|
||||||
|
|
||||||
ssl_key=../../ssl/ac.key
|
ssl_key=../../ssl/certs/ac.key
|
||||||
ssl_key_pass=your password
|
ssl_cert=../../ssl/certs/ac.crt
|
||||||
ssl_cert=../../ssl/ac.crt
|
|
||||||
|
|
||||||
For WTP the certiciate's config entries for now are hard-coded.
|
|
||||||
Now you can play around joining WTP to AC...
|
|
||||||
|
|
||||||
4. If you want to connect a Cisco 1130 series LAP to AC-Tube you
|
|
||||||
have to install the CA file on the LAP. Therofore you can create
|
|
||||||
a terminal script by executing:
|
|
||||||
|
|
||||||
./mkciscoimport.sh
|
|
||||||
|
|
||||||
Paste the result into a terminal session when in enabled mode.
|
|
||||||
|
|
||||||
To ac.conf add the following entry:
|
|
||||||
|
|
||||||
dtls_verify_peer = no
|
|
||||||
|
|
||||||
Now your Cisco 1130 LAP will join to AC-Tube. Remember that the
|
|
||||||
Cisco LAP will lose the installed certificate after rebooting.
|
|
||||||
|
|
||||||
If you want to use a Cisco LAP without installing on it your own
|
|
||||||
ca certificate, which is lost after each reboot, you can sign your
|
|
||||||
certificate with a Cisco intermediate ca certificate as explained
|
|
||||||
in the next section.
|
|
||||||
|
|
||||||
|
|
||||||
|
Installing your own root ca an a Cisco WTP
|
||||||
|
==========================================
|
||||||
|
|
||||||
|
If you want to connect a Cisco 1130 series LAP to AC-Tube
|
||||||
|
using a certificate signed by a root ca of your choice, you
|
||||||
|
have to install the CA file on the WTP. Therofore you can
|
||||||
|
create a terminal script by executing:
|
||||||
|
|
||||||
Get a Cisco AP out of the box connected to AC-Tube
|
./mkciscoimport.sh
|
||||||
==================================================
|
|
||||||
|
|
||||||
If you want to use a Cisco AP without installing your own CA
|
Paste the result into a terminal session when in enabled mode.
|
||||||
certificate on it, which is lost after each reboot, you have to
|
|
||||||
use a certificate with AC-Tube, that is signed by a CA, where the
|
|
||||||
CA certificate is already installed on the AP.
|
|
||||||
|
|
||||||
To create such a certificate a Cisco WLC uses an intermediate CA
|
To ac.conf add the following entry:
|
||||||
certificate, witch is signed by this root CA certificate, installed
|
|
||||||
on the AP.
|
|
||||||
|
|
||||||
If you have both, the intermediate CA certificate with an
|
dtls_verify_peer = no
|
||||||
appropriate private key and the CA certificate, which is installed
|
|
||||||
on the AP, you can create such a certificate like a Cisco WLC does,
|
|
||||||
by icopying them to the ./cisco sub-directory, using the
|
|
||||||
following names:
|
|
||||||
|
|
||||||
cisco-root-ca.crt: the CA certificate,
|
|
||||||
cisco-ca.crt: intermediate CA certificate
|
|
||||||
cisco-ca.key: private key.
|
|
||||||
|
|
||||||
All files have to be in PEM format.
|
|
||||||
|
|
||||||
Now run the script
|
|
||||||
|
|
||||||
./mkcert_cisco.sh
|
|
||||||
|
|
||||||
witch creates two files:
|
|
||||||
|
|
||||||
ac_cisco.pem
|
|
||||||
ac_cisco.key
|
|
||||||
|
|
||||||
When you get asked for a password, use always the same. The chosen
|
|
||||||
password is not imported. You don't need it later.
|
|
||||||
|
|
||||||
Now you can modify ac.conf to use the certificate and and key:
|
|
||||||
|
|
||||||
ssl_key=../../ssl/ac_cisco.key
|
|
||||||
ssl_cert=../../ssl/ac_cisco.pem
|
|
||||||
|
|
||||||
And a Cisco AP will now join AC-Tube without any modifications!
|
|
||||||
|
|
||||||
|
But remember, if you reboot the WTP the installed CA will be lost.
|
||||||
|
Currently there is no way to make the installation permanent.
|
||||||
|
|
||||||
|
|
||||||
If you experience with other Cisco LAPs (e.g. 1141), please tell me.
|
If you experience with other Cisco LAPs (e.g. 1141), please tell me.
|
||||||
|
Loading…
Reference in New Issue
Block a user