More information on how to connect a Cisco AP.
FossilOrigin-Name: 4906a299b0782436fd7528d4d32c6123f91327c038903884fe1d5c9b0ac07336
This commit is contained in:
		
							
								
								
									
										58
									
								
								ssl/README
									
									
									
									
									
								
							
							
						
						
									
										58
									
								
								ssl/README
									
									
									
									
									
								
							| @ -1,5 +1,7 @@ | |||||||
| Create ssl certificates to test AC-Tube and it's WTP |  | ||||||
| ==================================================== |  | ||||||
|  | Creating ssl certificates to test AC-Tube and it's WTP | ||||||
|  | ====================================================== | ||||||
|  |  | ||||||
| 1. Create a root CA by executing:  | 1. Create a root CA by executing:  | ||||||
|  |  | ||||||
| @ -41,6 +43,58 @@ Create ssl certificates to test AC-Tube and it's WTP | |||||||
|    Now your Cisco 1130 LAP will join to AC-Tube. Remember that the  |    Now your Cisco 1130 LAP will join to AC-Tube. Remember that the  | ||||||
|    Cisco LAP will lose the installed  certificate after rebooting.  |    Cisco LAP will lose the installed  certificate after rebooting.  | ||||||
|  |  | ||||||
|  |    If you want to use a Cisco LAP without installing on it your own | ||||||
|  |    ca certificate, which is lost after each reboot, you can sign your  | ||||||
|  |    certificate with a Cisco intermediate ca certificate as explained  | ||||||
|  |    in the next section.	 | ||||||
|  |     | ||||||
|  |  | ||||||
|  |  | ||||||
|  |  | ||||||
|  | Get a Cisco AP out of the box connected to AC-Tube | ||||||
|  | ================================================== | ||||||
|  |  | ||||||
|  | If you want to use a Cisco AP without installing your own CA  | ||||||
|  | certificate on it, which is lost after each reboot, you have to  | ||||||
|  | use a certificate with AC-Tube, that is signed by a CA, where the  | ||||||
|  | CA certificate is already installed on the AP. | ||||||
|  |  | ||||||
|  | To create such a certificate a Cisco WLC uses an intermediate CA  | ||||||
|  | certificate, witch is signed by this root CA certificate, installed  | ||||||
|  | on the AP.  | ||||||
|  |  | ||||||
|  | If you have both, the intermediate CA certificate with an  | ||||||
|  | appropriate private key and the CA certificate, which is installed  | ||||||
|  | on the AP, you can create such a certificate like a Cisco WLC does,  | ||||||
|  | by icopying them to the ./cisco  sub-directory, using the  | ||||||
|  | following names: | ||||||
|  |  | ||||||
|  | cisco-root-ca.crt: the CA certificate, | ||||||
|  | cisco-ca.crt: intermediate CA certificate | ||||||
|  | cisco-ca.key: private key. | ||||||
|  |  | ||||||
|  | All files have to be in PEM format. | ||||||
|  |  | ||||||
|  | Now run the script | ||||||
|  |  | ||||||
|  | ./mkcert_cisco.sh | ||||||
|  |  | ||||||
|  | witch creates two files:  | ||||||
|  |  | ||||||
|  | ac_cisco.pem  | ||||||
|  | ac_cisco.key | ||||||
|  |  | ||||||
|  | When you get asked for a password, use always the same. The chosen | ||||||
|  | password is not imported. You don't need it later. | ||||||
|  |  | ||||||
|  | Now you can modify ac.conf to use the certificate and and key: | ||||||
|  |  | ||||||
|  | ssl_key=../../ssl/ac_cisco.key | ||||||
|  | ssl_cert=../../ssl/ac_cisco.pem | ||||||
|  |  | ||||||
|  | And a Cisco AP will now join AC-Tube without any modifications! | ||||||
|  |  | ||||||
|  |  | ||||||
|  |  | ||||||
| If you experience with other Cisco LAPs (e.g. 1141), please tell me. | If you experience with other Cisco LAPs (e.g. 1141), please tell me. | ||||||
| 7u83@mail.ru. | 7u83@mail.ru. | ||||||
|  | |||||||
		Reference in New Issue
	
	Block a user