Creating SSL certificates to test AC-Tube and it's WTP's
1. Create a root CA by executing:
This creates some root CAs and intermediate CAs in the
subdirectories ./root-ca and ./intermediate-ca to sign
2. Create client certificates as needed
To create a client certificate, execute the script
./mkcert.sh <cert-name> [type]
where cert-name is the name of the certificate to be created
without extension and the optional parameter type specifies
the type of the certificate, which could be only 'cisco'
The created certificatte and key is found in the
named cert-name.pem and cert-name.key.
If you chose 'cisco-ap' as type, the certificate will be
accepted by a Cisco WTP when used in AC-Tube. The firmare
on Cisco's AP must be at least 7.3.
./mkcert.sh ac-cisco cisco-ap
will create the files ./certs/ac-cisco.pem and and ./certs/ac-cisco.key
On a Cisco AP you might have to reset the config over terminal,
before it will connet. Therefor do in enabeled mode:
clear capwap private-config
3. Put these entries into ac.conf located in the ac directory,
so AC-Tube wilil use the certificates. If you have named your certificate
just 'ac', put the following into config:
Installing your own root ca an a Cisco WTP
If you want to connect a Cisco 1130 series LAP to AC-Tube
using a certificate signed by a root ca of your choice, you
have to install the CA file on the WTP. Therofore you can
create a terminal script by executing:
Paste the result into a terminal session when in enabled mode.
To ac.conf add the following entry:
dtls_verify_peer = no
But remember, if you reboot the WTP the installed CA will be lost.
Currently there is no way to make the installation permanent.
If you experience with other Cisco LAPs (e.g. 1141), please tell me.