<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Creating and Installing a Wildcard WebAuth Certificate on WLC 5508 in HA in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/creating-and-installing-a-wildcard-webauth-certificate-on-wlc/m-p/2996124#M114245</link>
    <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I bumbled around for a while trying to get this worked out and thought I'd post my results here.&amp;nbsp; Search engine results were not clear as none of them tied together the entire process and I had a hard time finding the appropriate command to enable interfaces on the secondary after breaking HA.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;We wanted Web Auth for our guest users and employees with personal equipment.&amp;nbsp; An SSL cert is required for the WebAuth landing page, unless&amp;nbsp; WebAuth SecureWeb is disabled (under Management - HTTP-HTTPS), however this requires a controller reload/restart/reset as well.&amp;nbsp; In our situation I don't think it would have mattered, but if one had a form that collected information, they may want traffic secured.&amp;nbsp; Turning off WebAuth SecureWeb and using wireless isolation might be a good solution as well.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Generating the Certificate&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;For certificate generation, I installed the *.mydomain.org wildcard cert onto a computer, then used the DigiCert utility (&lt;A href="https://www.digicert.com/util/DigiCertUtil.zip" target="_blank"&gt;https://www.digicert.com/util/DigiCertUtil.zip&lt;/A&gt;) to export the certificate to PFX with the box checked so the certificates are chained.&amp;nbsp; When using the resulting certificate, I see the wildcard, intermediate and root certificates chained together.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Per steps from Cisco TAC - OpenSSL is used to convert PFX to CRT, rename to PEM and, convert to a P12, and convert back to a PEM.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;" lang="x-none"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="https://supportforums.cisco.com/document/12257921/wildcard-certificate-installation-wlc-wireless-lan-controller" target="_blank"&gt;https://supportforums.cisco.com/document/12257921/wildcard-certificate-installation-wlc-wireless-lan-controller&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;A href="onenote:#Cisco%20WLC%20SSL%20Cert%20Generation&amp;amp;section-id={A8540E29-7F54-4F81-AAFE-542F4AD6384B}&amp;amp;page-id={535FACEC-377E-443D-B7E2-B7161EEE67F1}&amp;amp;end&amp;amp;base-path=I:\Network%20Administrator\Network%20Documentation\Network\Wireless%20LAN.one" target="_blank"&gt;&lt;/A&gt;I'm guessing we could have done the first step with OpenSSL as documented by Cisco and skipped the rest as I reviewed the files later, I see the contents are very similar.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&lt;STRONG&gt;openssl&amp;gt; pkcs12 -in c:\temp\wc_domain_org.pfx -out wc_domain_org.cer -nodes&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Since the DigiCert output has everything chained and OpenSSL changed to CER, rename the resulting CER to PEM and attempt import to WLC would be a test,&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Installing the Certificate&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;The certificate can be installed on the Primary without breaking High Availability, but still requires a restart of the Primary to complete the change.&amp;nbsp; Navigate to Security -&amp;gt; Web Auth -&amp;gt; Certificate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Installing a certificate on the Secondary requires breaking High Availability.&amp;nbsp; When HA is broken, the controllers restart simultaneously. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;As the port IP addresses are replicated, breaking HA disables ports on the secondary.&amp;nbsp; &lt;B&gt;Connect a console cable to the secondary&lt;/B&gt; as you will need to enable ports to upload the certificate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Disable HA on the primary in CLI (or turn off AP SSO via web admin console: Controller -&amp;gt; Redundancy -&amp;gt; Global Configuration - SSO Disabled)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt; &amp;gt;config redundancy mode disable&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;(When I tried this from the GUI, a message is displayed indicating the Secondary will restart (got my hopes up), however both units restarted as expected - this was on some 7.6 code).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;When HA WLC restarts, change IP address on management interface to something unused on the subnet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;nbsp; &amp;gt;config interface address management 10.20.30.40 255.255.254.0 10.20.30.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Enable ports&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;gt;config port adminmode all enable&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;(one could enable only the management port here)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Once this is done, access the web interface, Navigate to Security -&amp;gt; Web Auth -&amp;gt; Certificate, check the box to download the SSL certificate and fill in the fields.&amp;nbsp; I have the SolarWinds TFTP server installed on my computer and used that ip/path.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;To Restore HA, on both units,&amp;nbsp; execute:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;THIS MUST BE DONE WITHIN MOMENTS OF EACH OTHER ON BOTH UNITS!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;gt;config redundancy mode sso&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I imagine one could do this in CLI on one and GUI on the other or both in GUI.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I would enjoy feedback on this. If you are aware of ways to make the process easier or have other ideas, please share.&amp;nbsp; Putting it all in one place makes it easier when I need a memory jog to do this again in 3 years.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Oh, and don't unplug the HA cable during this - if you do, the Secondary &lt;STRONG&gt;will&lt;/STRONG&gt; boot into Maintenance Mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;David&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 05 Jul 2021 12:39:33 GMT</pubDate>
    <dc:creator>david sain</dc:creator>
    <dc:date>2021-07-05T12:39:33Z</dc:date>
    <item>
      <title>Creating and Installing a Wildcard WebAuth Certificate on WLC 5508 in HA</title>
      <link>https://community.cisco.com/t5/wireless/creating-and-installing-a-wildcard-webauth-certificate-on-wlc/m-p/2996124#M114245</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I bumbled around for a while trying to get this worked out and thought I'd post my results here.&amp;nbsp; Search engine results were not clear as none of them tied together the entire process and I had a hard time finding the appropriate command to enable interfaces on the secondary after breaking HA.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;We wanted Web Auth for our guest users and employees with personal equipment.&amp;nbsp; An SSL cert is required for the WebAuth landing page, unless&amp;nbsp; WebAuth SecureWeb is disabled (under Management - HTTP-HTTPS), however this requires a controller reload/restart/reset as well.&amp;nbsp; In our situation I don't think it would have mattered, but if one had a form that collected information, they may want traffic secured.&amp;nbsp; Turning off WebAuth SecureWeb and using wireless isolation might be a good solution as well.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Generating the Certificate&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;For certificate generation, I installed the *.mydomain.org wildcard cert onto a computer, then used the DigiCert utility (&lt;A href="https://www.digicert.com/util/DigiCertUtil.zip" target="_blank"&gt;https://www.digicert.com/util/DigiCertUtil.zip&lt;/A&gt;) to export the certificate to PFX with the box checked so the certificates are chained.&amp;nbsp; When using the resulting certificate, I see the wildcard, intermediate and root certificates chained together.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Per steps from Cisco TAC - OpenSSL is used to convert PFX to CRT, rename to PEM and, convert to a P12, and convert back to a PEM.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="padding-left: 30px;" lang="x-none"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="https://supportforums.cisco.com/document/12257921/wildcard-certificate-installation-wlc-wireless-lan-controller" target="_blank"&gt;https://supportforums.cisco.com/document/12257921/wildcard-certificate-installation-wlc-wireless-lan-controller&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;A href="onenote:#Cisco%20WLC%20SSL%20Cert%20Generation&amp;amp;section-id={A8540E29-7F54-4F81-AAFE-542F4AD6384B}&amp;amp;page-id={535FACEC-377E-443D-B7E2-B7161EEE67F1}&amp;amp;end&amp;amp;base-path=I:\Network%20Administrator\Network%20Documentation\Network\Wireless%20LAN.one" target="_blank"&gt;&lt;/A&gt;I'm guessing we could have done the first step with OpenSSL as documented by Cisco and skipped the rest as I reviewed the files later, I see the contents are very similar.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&lt;STRONG&gt;openssl&amp;gt; pkcs12 -in c:\temp\wc_domain_org.pfx -out wc_domain_org.cer -nodes&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Since the DigiCert output has everything chained and OpenSSL changed to CER, rename the resulting CER to PEM and attempt import to WLC would be a test,&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 12pt;"&gt;&lt;STRONG&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Installing the Certificate&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;The certificate can be installed on the Primary without breaking High Availability, but still requires a restart of the Primary to complete the change.&amp;nbsp; Navigate to Security -&amp;gt; Web Auth -&amp;gt; Certificate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Installing a certificate on the Secondary requires breaking High Availability.&amp;nbsp; When HA is broken, the controllers restart simultaneously. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;As the port IP addresses are replicated, breaking HA disables ports on the secondary.&amp;nbsp; &lt;B&gt;Connect a console cable to the secondary&lt;/B&gt; as you will need to enable ports to upload the certificate.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Disable HA on the primary in CLI (or turn off AP SSO via web admin console: Controller -&amp;gt; Redundancy -&amp;gt; Global Configuration - SSO Disabled)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp; &amp;nbsp;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt; &amp;gt;config redundancy mode disable&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;(When I tried this from the GUI, a message is displayed indicating the Secondary will restart (got my hopes up), however both units restarted as expected - this was on some 7.6 code).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 2&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;When HA WLC restarts, change IP address on management interface to something unused on the subnet.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;nbsp; &amp;gt;config interface address management 10.20.30.40 255.255.254.0 10.20.30.1&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 3&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Enable ports&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;gt;config port adminmode all enable&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;(one could enable only the management port here)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Once this is done, access the web interface, Navigate to Security -&amp;gt; Web Auth -&amp;gt; Certificate, check the box to download the SSL certificate and fill in the fields.&amp;nbsp; I have the SolarWinds TFTP server installed on my computer and used that ip/path.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Step 4&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;To Restore HA, on both units,&amp;nbsp; execute:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;THIS MUST BE DONE WITHIN MOMENTS OF EACH OTHER ON BOTH UNITS!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;SPAN style="font-family: courier new,courier,monospace;"&gt;&amp;gt;config redundancy mode sso&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11pt; padding-left: 30px;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I imagine one could do this in CLI on one and GUI on the other or both in GUI.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;I would enjoy feedback on this. If you are aware of ways to make the process easier or have other ideas, please share.&amp;nbsp; Putting it all in one place makes it easier when I need a memory jog to do this again in 3 years.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Oh, and don't unplug the HA cable during this - if you do, the Secondary &lt;STRONG&gt;will&lt;/STRONG&gt; boot into Maintenance Mode.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;Best Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: Calibri; font-size: 11.0pt;"&gt;&lt;SPAN style="font-size: 10pt; font-family: arial,helvetica,sans-serif;"&gt;David&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 12:39:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/creating-and-installing-a-wildcard-webauth-certificate-on-wlc/m-p/2996124#M114245</guid>
      <dc:creator>david sain</dc:creator>
      <dc:date>2021-07-05T12:39:33Z</dc:date>
    </item>
    <item>
      <title>Re: Creating and Installing a Wildcard WebAuth Certificate on WLC 5508</title>
      <link>https://community.cisco.com/t5/wireless/creating-and-installing-a-wildcard-webauth-certificate-on-wlc/m-p/4718470#M248021</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Installing a certificate on the Secondary requires breaking High Availability.&amp;nbsp; When HA is broken, the controllers restart simultaneously.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The step above is required for both admin certificate and webauth certificate ?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 09 Nov 2022 06:53:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/creating-and-installing-a-wildcard-webauth-certificate-on-wlc/m-p/4718470#M248021</guid>
      <dc:creator>rafafilho11</dc:creator>
      <dc:date>2022-11-09T06:53:12Z</dc:date>
    </item>
  </channel>
</rss>

