<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615667#M242379</link>
    <description>&lt;P&gt;I performed the procedures as described:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213917-generate-csr-for-third-party-certificate.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213917-generate-csr-for-third-party-certificate.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PKCS12 Format Conversion and Certificate Chain in Multi-Level CA Scenarios.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It is possible to end up in a situation where you have a private key file and certificate in PEM or CRT format and want to combine them in a PKCS12 (.pfx) format to upload to the 9800 WLC. In order to do so, enter this command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl pkcs12 -export -in &amp;lt;PEM certificate filename&amp;gt; -inkey &amp;lt;privatekey.key&amp;gt; -out &amp;lt;output new .pfx filename&amp;gt;&lt;BR /&gt;In the case where you have a chain of certificate (one or multiple intermediate CA and root CA) all in PEM format, you then need to combine all in a single .pfx file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, manually combine the CA certificates in a single file as such. Copy and paste the contents together (save the file in .pem format):&lt;/P&gt;&lt;P&gt;----- BEGIN Certificate --------&lt;BR /&gt;&amp;lt;intermediate CA cert&amp;gt;&lt;BR /&gt;------END Certificate --------&lt;BR /&gt;-----BEGIN Certificate -----&lt;BR /&gt;&amp;lt;root CA cert&amp;gt;&lt;BR /&gt;-----END Certificate--------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Later you can then combine all in one PKCS12 certificate file with :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl pkcs12 -export -out chaincert.pfx -inkey &amp;lt;deviceprivatekey&amp;gt; -in &amp;lt;device private certificate&amp;gt; -certfile &amp;lt;combined CA file.pem&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 23 May 2022 18:03:05 GMT</pubDate>
    <dc:creator>Bolivar</dc:creator>
    <dc:date>2022-05-23T18:03:05Z</dc:date>
    <item>
      <title>Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with https</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613368#M242215</link>
      <description>&lt;P&gt;Hi guys&lt;/P&gt;&lt;P&gt;I'm having Web Auth issues with https.&lt;BR /&gt;For some devices, authentication works correctly (with https).&lt;BR /&gt;For others, the user is redirected to an (unsecured) http page.&lt;/P&gt;&lt;P&gt;I noticed that this problem occurs mainly when I use radius authentication.&lt;BR /&gt;On the other hand, when using local authentication, the problem does not occur.&lt;/P&gt;&lt;P&gt;NOTE: authentication via radios is working, but without https.&lt;/P&gt;&lt;P&gt;can you help me?&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 17:38:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613368#M242215</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-19T17:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613422#M242218</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;which WLC do you have? Which version? Which RADIUS? If ISE, which version?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 18:09:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613422#M242218</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-19T18:09:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613434#M242220</link>
      <description>&lt;P&gt;Cisco Catalyst 9800-CL Wireless Controller&lt;/P&gt;&lt;P&gt;Version:&amp;nbsp;17.3.5a&lt;/P&gt;&lt;P&gt;Free Radius with Open LDAP&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 18:34:22 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613434#M242220</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-19T18:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613449#M242223</link>
      <description>&lt;P&gt;&amp;nbsp;Did you create a ACL for web redirect on the WLC? For both ports 80 and 443?&amp;nbsp; It seems to me that you did por port 80 only.&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 18:53:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613449#M242223</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-19T18:53:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613472#M242229</link>
      <description>&lt;P&gt;Virtual IPv4 Address: 192.168.2.151&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C9800#show access-lists&lt;BR /&gt;Extended IP access list AutoQos-4.0-Output-Acl-CAPWAP-C&lt;BR /&gt;10 permit udp any eq 5246 16666 any&lt;BR /&gt;Extended IP access list IP-Adm-V4-Int-ACL-global&lt;BR /&gt;10 permit tcp any any eq www&lt;BR /&gt;20 permit tcp any host 192.168.2.151 eq 443&lt;BR /&gt;Extended IP access list IP-Adm-V4-LOGOUT-ACL&lt;BR /&gt;10 permit tcp any host 192.168.2.151 eq www&lt;BR /&gt;20 permit tcp any host 192.168.2.151 eq 443&lt;BR /&gt;Extended IP access list implicit_deny&lt;BR /&gt;10 deny ip any any&lt;BR /&gt;Extended IP access list implicit_permit&lt;BR /&gt;10 permit ip any any&lt;BR /&gt;Extended IP access list meraki-fqdn-dns&lt;BR /&gt;Extended IP access list preauth_v4&lt;BR /&gt;10 permit udp any any eq domain&lt;BR /&gt;20 permit tcp any any eq domain&lt;BR /&gt;30 permit udp any eq bootps any&lt;BR /&gt;40 permit udp any any eq bootpc&lt;BR /&gt;50 permit udp any eq bootpc any&lt;BR /&gt;60 deny ip any any&lt;BR /&gt;IPv6 access list implicit_deny_v6&lt;BR /&gt;deny ipv6 any any sequence 10&lt;BR /&gt;IPv6 access list implicit_permit_v6&lt;BR /&gt;permit ipv6 any any sequence 10&lt;BR /&gt;IPv6 access list preauth_v6&lt;BR /&gt;permit udp any any eq domain sequence 10&lt;BR /&gt;permit tcp any any eq domain sequence 20&lt;BR /&gt;permit icmp any any nd-ns sequence 30&lt;BR /&gt;permit icmp any any nd-na sequence 40&lt;BR /&gt;permit icmp any any router-solicitation sequence 50&lt;BR /&gt;permit icmp any any router-advertisement sequence 60&lt;BR /&gt;permit icmp any any redirect sequence 70&lt;BR /&gt;permit udp any eq 547 any eq 546 sequence 80&lt;BR /&gt;permit udp any eq 546 any eq 547 sequence 90&lt;BR /&gt;deny ipv6 any any sequence 100&lt;/P&gt;</description>
      <pubDate>Thu, 19 May 2022 19:24:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613472#M242229</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-19T19:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613478#M242230</link>
      <description>&lt;P&gt;Your ACL must deny Radius IP address.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Take a look on this doc&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A title="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html" href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html" target="_self"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213920-central-web-authentication-cwa-on-cata.html&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3 id="toc-hId-881505252"&gt;Redirect ACL Configuration&lt;/H3&gt;</description>
      <pubDate>Thu, 19 May 2022 19:37:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4613478#M242230</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-19T19:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614095#M242279</link>
      <description>&lt;P&gt;Thanks for answering.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I had already checked the documentation you sent.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To test, I created an ACL that completely frees communication with the RADIUS server address. However, the problem persists.&lt;/P&gt;&lt;P&gt;I don't think it's a problem with ACLs, since on some devices, both HTTPs and RADIO authentication work normally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On a notebook, with Windows 11 installed, web authentication is working correctly. On the other hand, when I try to use a notebook with linux (debian), an android smartphone or an iphone, I get errors (invalid certificate) or a captive portal opens with http (no security).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I noticed that each of the devices uses the default captive portal:&lt;/P&gt;&lt;P&gt;Android:&lt;BR /&gt;&lt;A href="http://connectivitycheck.gstatic.com" target="_blank"&gt;http://connectivitycheck.gstatic.com&lt;/A&gt;&lt;BR /&gt;or, when opened via browser, an https error is displayed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Debian Linux via firefox: &lt;A href="http://detectportal.firefox.com/succex.txt" target="_blank"&gt;http://detectportal.firefox.com/succex.txt&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Windows 11:&lt;BR /&gt;When trying to access, the standard windows portal is opened (&lt;A href="http://www.msftconnecttest.com/redirect" target="_blank"&gt;http://www.msftconnecttest.com/redirect&lt;/A&gt;), and then it is redirected to the correct personalized page, with https, that is, it works correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;NOTE: both in windows and in other operating systems, authentication via RADIUS server works correctly. The problem lies in not always guaranteeing a secure connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, if I manually access the correct captive portal address, on the device I want to authenticate, in some cases it works normally, in others, it doesn't load the complete certificate chain, resulting in non-validation and error due to lack of root certificate.&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 13:31:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614095#M242279</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-20T13:31:41Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614140#M242282</link>
      <description>&lt;P&gt;&amp;nbsp;Radius communication and web auth happens totally different, so, you can not compare.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For Web auth in previous WLC version based on AIROS, you should have an ACL allowing the Radius IP address for Central Web Authentication.&lt;/P&gt;
&lt;P&gt;On the WLC 9800, for some reason, they change the logic and now we need to deny the Radius IP address.&amp;nbsp; The experience I have is based in ISE for the process with&amp;nbsp; FreeRadius might be different.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;But for ISE with CWA, I am sure that you need the ACL for web auth.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 14:19:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614140#M242282</guid>
      <dc:creator>Flavio Miranda</dc:creator>
      <dc:date>2022-05-20T14:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614910#M242317</link>
      <description>&lt;P&gt;Whether you use ISE or FR makes no difference - they both use radius.&lt;/P&gt;
&lt;P&gt;This sounds more like a certificate problem - that's why the redirect from the captive portal http pages isn't working.&lt;/P&gt;
&lt;P&gt;Have you used a valid public certificate with correct matching working DNS domain for the certificate name?&lt;/P&gt;
&lt;P&gt;Your ACL also needs to allow access to the certificate's CRL, OCSP and policy servers so that devices can fully verify/validate the certificate.&lt;/P&gt;
&lt;P&gt;For example:&lt;/P&gt;
&lt;P&gt;X509v3 CRL Distribution Points:&lt;/P&gt;
&lt;P&gt;Full Name:&amp;nbsp;URI:&lt;A href="http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl" target="_blank"&gt;http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1.crl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Full Name:&amp;nbsp;URI:&lt;A href="http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl" target="_blank"&gt;http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1.crl&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;X509v3 Certificate Policies: &lt;BR /&gt;Policy: 2.16.840.1.114412.1.1&amp;nbsp;&amp;nbsp;CPS: &lt;A href="https://www.digicert.com/CPS" target="_blank"&gt;https://www.digicert.com/CPS&lt;/A&gt;&lt;BR /&gt;Authority Information Access:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;OCSP - URI:&lt;A href="http://ocsp.digicert.com" target="_blank"&gt;http://ocsp.digicert.com&lt;/A&gt;&lt;BR /&gt;CA Issuers - URI:&lt;A href="http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt" target="_blank"&gt;http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1.crt&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 22 May 2022 09:54:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614910#M242317</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-05-22T09:54:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614952#M242322</link>
      <description>&lt;P&gt;&lt;SPAN&gt;For others, the user is redirected to an (unsecured) http page.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;on this insecure page, can you check the correct certificate is presented by radius server, if yes then this might be device issue. Some devices specially Apple It&amp;nbsp;usually occurs when the public certificate includes a Certificate Revocation List (CRL) distribution point that the iOS device needs to verify. The iOS device cannot verify the CRL without network access.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 22 May 2022 15:07:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4614952#M242322</guid>
      <dc:creator>Ambuj M</dc:creator>
      <dc:date>2022-05-22T15:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615645#M242376</link>
      <description>&lt;P&gt;Yes, I believe it is a problem with the certificate validation.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The domain was signed with a public certificate.&lt;/P&gt;&lt;P&gt;I noticed that on computers where the capitve portal is working correctly, the complete certificate chain is shown.&lt;/P&gt;&lt;P&gt;On the other hand, on computers that have an error, the root certificate does not appear.&amp;nbsp;As shown:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Incomplete string, with error:&lt;BR /&gt;RNP ICPEdu OV SSL CA 2019 --&amp;gt; wlogin.cpd.ufsm.br&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Complete string, no error:&lt;BR /&gt;GlobalSign Root CA - R3 --&amp;gt; Trusted Root TLS SHA256 G3 --&amp;gt; RNP ICPEdu OV SSL CA 2019 --&amp;gt; wlogin.cpd.ufsm.br&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 17:01:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615645#M242376</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-23T17:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615659#M242378</link>
      <description>&lt;P&gt;Are you delivering the full cert chain together with your cert (best to make sure you are)?&lt;/P&gt;
&lt;P&gt;In some cases the OS may need to be updated to support the latest certs and root CAs.&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 17:48:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615659#M242378</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-05-23T17:48:57Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615667#M242379</link>
      <description>&lt;P&gt;I performed the procedures as described:&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213917-generate-csr-for-third-party-certificate.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/213917-generate-csr-for-third-party-certificate.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;PKCS12 Format Conversion and Certificate Chain in Multi-Level CA Scenarios.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;It is possible to end up in a situation where you have a private key file and certificate in PEM or CRT format and want to combine them in a PKCS12 (.pfx) format to upload to the 9800 WLC. In order to do so, enter this command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl pkcs12 -export -in &amp;lt;PEM certificate filename&amp;gt; -inkey &amp;lt;privatekey.key&amp;gt; -out &amp;lt;output new .pfx filename&amp;gt;&lt;BR /&gt;In the case where you have a chain of certificate (one or multiple intermediate CA and root CA) all in PEM format, you then need to combine all in a single .pfx file.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;First, manually combine the CA certificates in a single file as such. Copy and paste the contents together (save the file in .pem format):&lt;/P&gt;&lt;P&gt;----- BEGIN Certificate --------&lt;BR /&gt;&amp;lt;intermediate CA cert&amp;gt;&lt;BR /&gt;------END Certificate --------&lt;BR /&gt;-----BEGIN Certificate -----&lt;BR /&gt;&amp;lt;root CA cert&amp;gt;&lt;BR /&gt;-----END Certificate--------&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Later you can then combine all in one PKCS12 certificate file with :&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;openssl pkcs12 -export -out chaincert.pfx -inkey &amp;lt;deviceprivatekey&amp;gt; -in &amp;lt;device private certificate&amp;gt; -certfile &amp;lt;combined CA file.pem&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 18:03:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615667#M242379</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-05-23T18:03:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615806#M242392</link>
      <description>&lt;P&gt;And if you do a packet capture can you see the client receiving the complete chain?&lt;/P&gt;
&lt;P&gt;If it's receiving the complete chain but not recognising/accepting the root certs then OS update is the only option or some devices will need to be replaced if there is no update available.&lt;/P&gt;</description>
      <pubDate>Mon, 23 May 2022 22:37:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4615806#M242392</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2022-05-23T22:37:53Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4657529#M244511</link>
      <description>&lt;P&gt;I was able to solve the problem by entering the signed certificate along with the root and intermediary certificate on an external apache server.&lt;BR /&gt;Thanks a lot for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 12:29:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4657529#M244511</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-07-26T12:29:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Catalyst 9800-CL Wireless Controller: Error Web Auth with ht</title>
      <link>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4657546#M244512</link>
      <description>&lt;P&gt;Adding these lines in apache server configuration&lt;/P&gt;&lt;P&gt;SSLCertificateFile /etc/apache2/certificate/mydomain.crt&lt;BR /&gt;SSLCertificateKeyFile /etc/apache2/certificate/mydomain.key&lt;BR /&gt;SSLCertificateChainFile /etc/apache2/certificate/intermediate.pem&lt;/P&gt;</description>
      <pubDate>Tue, 26 Jul 2022 12:47:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-catalyst-9800-cl-wireless-controller-error-web-auth-with/m-p/4657546#M244512</guid>
      <dc:creator>Bolivar</dc:creator>
      <dc:date>2022-07-26T12:47:29Z</dc:date>
    </item>
  </channel>
</rss>

