{"id":355,"date":"2016-01-19T15:04:16","date_gmt":"2016-01-19T15:04:16","guid":{"rendered":"http:\/\/www.pkipartner.support\/?page_id=355"},"modified":"2016-02-23T14:54:18","modified_gmt":"2016-02-23T14:54:18","slug":"install-certificate-installation-cisco-wlan-4400","status":"publish","type":"page","link":"https:\/\/pkipartner.com\/support\/install-certificate-installation-cisco-wlan-4400\/","title":{"rendered":"Install &#8211; Cisco WLAN 4400"},"content":{"rendered":"<h1><strong>Certificate Installation: Cisco WLAN 4400<\/strong><\/h1>\n<h2><span style=\"text-decoration: underline;\">\u00a0Procedure for Uploading Chained Certificates to the Cisco WLAN 4400<strong>:<\/strong><\/span><\/h2>\n<p>When you receive the .zip file from PKI Partner it will contain the following files &#8220;The Entity (domain certificate), The Root, and The Intermediate Certificates&#8221;. You will need to combine them into one .pem file.<\/p>\n<p>To accomplish the task of changing the .crt file to a .pem file you will need to do the following:<\/p>\n<ol>\n<li>Open each .crt file in a text editor (notepad, wordpad, etc.)<\/li>\n<li>Open an additional blank text editor page<\/li>\n<li>Copy the contents of each .crt file in this order and paste it into the blank text editor<\/li>\n<\/ol>\n<p>\u2212\u2212\u2212\u2212\u2212\u2212BEGIN CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212<br \/>\n*Entity cert*<br \/>\n\u2212\u2212\u2212\u2212\u2212\u2212END CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212<\/p>\n<p>\u2212\u2212\u2212\u2212\u2212\u2212BEGIN CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212<br \/>\n*Intermediate CA cert *<br \/>\n\u2212\u2212\u2212\u2212\u2212\u2212END CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212\u2212\u2212<\/p>\n<p>\u2212\u2212\u2212\u2212\u2212\u2212BEGIN CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212<br \/>\n*Root CA cert *<br \/>\n\u2212\u2212\u2212\u2212\u2212\u2212END CERTIFICATE\u2212\u2212\u2212\u2212\u2212\u2212<\/p>\n<ol start=\"4\">\n<li>Once the files are in order you can now save the file as <strong>&#8220;yourdomain.pem&#8221;.<\/strong><\/li>\n<\/ol>\n<p>In order to determine which chain of trust you have, please check the document<br \/>\n<a href=\"http:\/\/pkipartner.files.wordpress.com\/2014\/03\/which-is-root-which-is-intermediate.pdf\">Which is Root? Which is Intermediate?<\/a><\/p>\n<p><strong><u>Note:<\/u><\/strong> Openssl is required<\/p>\n<p>To obtain a copy of OpenSSL for:<\/p>\n<p><strong>Windows:<\/strong> <a href=\"http:\/\/www.shininglightpro.com\/products\/Win32OpenSSL.html\">Windows 2000 or better<\/a>.<br \/>\n<strong>Unix-like: (Linux, OS X, etc.) <\/strong><a href=\"http:\/\/www.openssl.org\/\">OpenSSL.org website<\/a> for binaries.<\/p>\n<p>&nbsp;<\/p>\n<p>Next, combine this file (yourdomain.pem) with the private key that you generated along with the CSR, the private key of the device certificate, which is mykey.pem in this example. Combine the &#8220;yourdomain.pem&#8221; certificate with the private key, and then convert the file to a .pem file. This final certificate is called as &#8220;final.pem&#8221;.<\/p>\n<p>Issue these commands in the OpenSSL application to achieve this:<\/p>\n<p><strong><em>openssl&gt;pkcs12 \u2212export \u2212in yourdomain.pem \u2212inkey mykey.pem \u2212out yourdomain.p12 \u2212clcerts<\/em><\/strong><\/p>\n<p><strong><em>openssl&gt;pkcs12 \u2212in yourdomain.p12 \u2212out final\u2212cert.pem \u2212passin pass:check123 \u2212passout<\/em><\/strong><\/p>\n<p><strong><u>Note:<\/u><\/strong><br \/>\nIn this command, you must enter a password for the parameters \u2212passin and \u2212passout.<\/p>\n<p>The password that is configured for the \u2212passout parameter must match the certpassword parameter that is configured on the WLC.<\/p>\n<p>In this example, the password that is configured for both the \u2212passin and \u2212passout parameters is check123.<\/p>\n<p><strong>&#8220;final.pem&#8221;<\/strong> is the file that we need to upload to the Wireless LAN Controller. The next step is to upload this file to the WLC as a Vendor device certificate.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Certificate Installation: Cisco WLAN 4400 \u00a0Procedure for Uploading Chained Certificates to the Cisco WLAN 4400: When you receive the .zip file from PKI Partner it will contain the following files &#8220;The Entity (domain certificate), The Root, and The Intermediate Certificates&#8221;. You will need to combine them into one .pem file.\u2026<\/p>\n<p> <a class=\"continue-reading-link\" href=\"https:\/\/pkipartner.com\/support\/install-certificate-installation-cisco-wlan-4400\/\"><span>Continue reading<\/span><i class=\"crycon-right-dir\"><\/i><\/a> <\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/pages\/355"}],"collection":[{"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":3,"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/pages\/355\/revisions"}],"predecessor-version":[{"id":729,"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/pages\/355\/revisions\/729"}],"wp:attachment":[{"href":"https:\/\/pkipartner.com\/support\/wp-json\/wp\/v2\/media?parent=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}