More information on how to connect a Cisco AP.
FossilOrigin-Name: 4906a299b0782436fd7528d4d32c6123f91327c038903884fe1d5c9b0ac07336
This commit is contained in:
parent
52740e1959
commit
ce01c6327e
58
ssl/README
58
ssl/README
@ -1,5 +1,7 @@
|
||||
Create ssl certificates to test AC-Tube and it's WTP
|
||||
====================================================
|
||||
|
||||
|
||||
Creating ssl certificates to test AC-Tube and it's WTP
|
||||
======================================================
|
||||
|
||||
1. Create a root CA by executing:
|
||||
|
||||
@ -41,6 +43,58 @@ Create ssl certificates to test AC-Tube and it's WTP
|
||||
Now your Cisco 1130 LAP will join to AC-Tube. Remember that the
|
||||
Cisco LAP will lose the installed certificate after rebooting.
|
||||
|
||||
If you want to use a Cisco LAP without installing on it your own
|
||||
ca certificate, which is lost after each reboot, you can sign your
|
||||
certificate with a Cisco intermediate ca certificate as explained
|
||||
in the next section.
|
||||
|
||||
|
||||
|
||||
|
||||
Get a Cisco AP out of the box connected to AC-Tube
|
||||
==================================================
|
||||
|
||||
If you want to use a Cisco AP without installing your own CA
|
||||
certificate on it, which is lost after each reboot, you have to
|
||||
use a certificate with AC-Tube, that is signed by a CA, where the
|
||||
CA certificate is already installed on the AP.
|
||||
|
||||
To create such a certificate a Cisco WLC uses an intermediate CA
|
||||
certificate, witch is signed by this root CA certificate, installed
|
||||
on the AP.
|
||||
|
||||
If you have both, the intermediate CA certificate with an
|
||||
appropriate private key and the CA certificate, which is installed
|
||||
on the AP, you can create such a certificate like a Cisco WLC does,
|
||||
by icopying them to the ./cisco sub-directory, using the
|
||||
following names:
|
||||
|
||||
cisco-root-ca.crt: the CA certificate,
|
||||
cisco-ca.crt: intermediate CA certificate
|
||||
cisco-ca.key: private key.
|
||||
|
||||
All files have to be in PEM format.
|
||||
|
||||
Now run the script
|
||||
|
||||
./mkcert_cisco.sh
|
||||
|
||||
witch creates two files:
|
||||
|
||||
ac_cisco.pem
|
||||
ac_cisco.key
|
||||
|
||||
When you get asked for a password, use always the same. The chosen
|
||||
password is not imported. You don't need it later.
|
||||
|
||||
Now you can modify ac.conf to use the certificate and and key:
|
||||
|
||||
ssl_key=../../ssl/ac_cisco.key
|
||||
ssl_cert=../../ssl/ac_cisco.pem
|
||||
|
||||
And a Cisco AP will now join AC-Tube without any modifications!
|
||||
|
||||
|
||||
|
||||
If you experience with other Cisco LAPs (e.g. 1141), please tell me.
|
||||
7u83@mail.ru.
|
||||
|
Loading…
Reference in New Issue
Block a user