
- #EDIT WEB PORTAL BUNDLE CISCO WLC INSTALL#
- #EDIT WEB PORTAL BUNDLE CISCO WLC SOFTWARE#
- #EDIT WEB PORTAL BUNDLE CISCO WLC CODE#
- #EDIT WEB PORTAL BUNDLE CISCO WLC PASSWORD#
- #EDIT WEB PORTAL BUNDLE CISCO WLC DOWNLOAD#
To create a self-signed certificate, you add part of a cryptographic key pair in a certificate signing request (CSR) and send the request to a CA. A CSR generated on the Firebox automatically includes these EKU values. These values are required for any web server certificates imported on the Firebox.
#EDIT WEB PORTAL BUNDLE CISCO WLC SOFTWARE#
If you create a certificate with third-party software such as OpenSSL, the EKU field in the certificate must be populated with the values for TLS Web Server Authentication and TLS Web Client Authentication.
#EDIT WEB PORTAL BUNDLE CISCO WLC INSTALL#
To import and install a new web server certificate, you must follow these steps: These certificates must be imported to your Firebox in the correct order before you install the new web server certificate so that the chain of trust is established. In most cases, this certificate signed by a Certificate Authority (CA) requires one or more root and intermediate certificates to complete the chain of trust for the current certificate. If you use a signed CA certificate, you must import this certificate to your Firebox before you can select it as the current web server certificate. You can replace the default web server certificate with a signed CA certificate that will be automatically trusted by web browsers. This warning occurs because the default web server certificate is not trusted, or because the certificate does not match the IP address or domain name used for authentication. When users connect to your Firebox with a web browser, they often see a security warning. Reboot the WLC in order for the changes to take effect.Import and Install a Third-Party Web Server Certificate Reboot the switch to use new certificate.
#EDIT WEB PORTAL BUNDLE CISCO WLC DOWNLOAD#
Then enter 'y' at the prompt in order to confirm the current download settings and start the certificate and key download. Issue the transfer download start command in order to view the updated settings. If you used WLC itself to generate the CSR, then you can leave the certpassword field blank. Note: The value for certpassword must be the same as the -passout parameter you set earlier.
pem file so that the operating system can decrypt the SSL key and certificate. In the CLI, issue these commands in order to change the download settings: Move either the pemchain.pem file (for WLC CSR generation) or the mycert.pem (for OpenSSL CSR generation) file to the default directory on your TFTP server. Uploading Your CertificateĬomplete these steps in order to download the chained certificate to the WLC with the CLI:
#EDIT WEB PORTAL BUNDLE CISCO WLC PASSWORD#
The password that is configured for the -passout parameter must match the certpassword parameter that is configured on the WLC. Note: In the above command you must enter a password for the parameters -passin and -passout. Note: Any of the parameters above that are underlined are variable to your scenario and may differ based on file names and other criteria. Openssl>pkcs12 -in mycert.p12 -out mycert.pem -passin pass: -passout pass: Openssl>pkcs12 -export -in pemchain.pem -inkey mykey.key -out mycert.p12 -clcerts -passin pass: -passout pass: You will need to run the following commands in OpenSSL to combine the files:

Once you verify that the file is correct, upload it to the same directory as your mykey.key private key that you created along with the CSR. If you used OpenSSL to create your CSR, then you must continue on with this section. If you created the CSR directly within the WLC (which means that your version of WLC is also greater than 8.3.102) then you can skip directly to the Uploading Your Certificate section below. You do not have to do this, however you must change the filename in the command below to match the name of your PEM with chain Format filename.
#EDIT WEB PORTAL BUNDLE CISCO WLC CODE#
Note: In order to work with the code below, rename the file to pemchain.pem. When the file is downloaded, open it using a simple plain text editor (such as Notepad) and verify that the contents follow this format: As an Administrator, you must first go to the Advanced Download button. In the SSL Subscriber portal, this option is at the bottom.

When you download your certificate, ensure you select the PEM with chain option.
