<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco 5520 WLC WebAdmin Cert in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4982976#M264632</link>
    <description>&lt;P&gt;There's no easy way to that.&amp;nbsp; It would require filtering the TLS header for the SNI field and allowing the FQDN SNI while dropping the IP SNI.&amp;nbsp; But TLS 1.3 introduces encrypted SNI so eventually even that won't be possible but for today if you wanted to do that for 5520 that's how you would do it.&lt;/P&gt;
&lt;P&gt;Otherwise you just need to educate your users or apply policy to their devices blocking access to the direct IP URL.&lt;/P&gt;</description>
    <pubDate>Thu, 21 Dec 2023 11:34:18 GMT</pubDate>
    <dc:creator>Rich R</dc:creator>
    <dc:date>2023-12-21T11:34:18Z</dc:date>
    <item>
      <title>Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776151#M251760</link>
      <description>&lt;P&gt;I'm trying to install a WebAdmin cert for a Cisco WLC 5520 version 8.5.151.&lt;BR /&gt;&lt;BR /&gt;I generated the CSR via CLI and had it signed. I uploaded the .pem file to the controller. It's returning a certificate error of &lt;SPAN&gt;NET::ERR_CERT_COMMON_NAME_INVALID when visiting the webadmin login page. I entered the FQDN in the common name when I generated the CSR, and the FQDN is in DNS and resolves.&lt;BR /&gt;&lt;BR /&gt;Is there something that would fix this issue?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 17:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776151#M251760</guid>
      <dc:creator>Chris Terry</dc:creator>
      <dc:date>2023-02-15T17:42:13Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776156#M251762</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;- FYI :&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/215425-troubleshoot-certificate-installation-on.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/215425-troubleshoot-certificate-installation-on.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;M.&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 17:55:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776156#M251762</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2023-02-15T17:55:54Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776233#M251764</link>
      <description>&lt;P&gt;Once certificate installed, did you reboot the controllers?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have you updated&amp;nbsp;&lt;SPAN&gt;your DNS with the entry of the information on the Virtual interface?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;CJ&lt;/P&gt;
&lt;P&gt;/*Please rate all useful responses*/&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 21:28:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776233#M251764</guid>
      <dc:creator>jagan.chowdam</dc:creator>
      <dc:date>2023-02-15T21:28:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776270#M251766</link>
      <description>&lt;P&gt;Hi CJ,&lt;/P&gt;&lt;P&gt;Can you be more specific? Does there need to be a DNS entry for the virtual IP, or are you referring to the DNS Host Name field under the Virtual Interface settings? Will it be the same hostname that would be set for the management IP, or would it be a different name that would be included as a SAN in the cert?&lt;/P&gt;</description>
      <pubDate>Wed, 15 Feb 2023 22:36:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776270#M251766</guid>
      <dc:creator>Chris Terry</dc:creator>
      <dc:date>2023-02-15T22:36:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776965#M251809</link>
      <description>&lt;P&gt;Generally speaking as long as you follow the instructions to the letter here&amp;nbsp;&lt;A href="https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/109597-csr-chained-certificates-wlc-00.html" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/support/docs/wireless/4400-series-wireless-lan-controllers/109597-csr-chained-certificates-wlc-00.html&lt;/A&gt;&amp;nbsp;it should just work.&lt;BR /&gt;We don't use the WLC to generate the CSR - we use openssl.&lt;BR /&gt;Our DNS entry = CN = first SAN entry = WLC virtual hostname&lt;BR /&gt;And the DNS entry resolves to the&amp;nbsp;WLC virtual IP.&lt;BR /&gt;That has worked reliably for us for years.&lt;/P&gt;
&lt;P&gt;From the link above:&lt;BR /&gt;&lt;STRONG&gt;Note&lt;/STRONG&gt;: It is important to provide the correct Common Name. Ensure that the host name that is used to create the certificate (Common Name) matches the Domain Name System (DNS) host name entry for the virtual interface IP address on the WLC and that the name exists in the DNS as well. Also, after you make the change to the Virtual IP (VIP) interface, you must reboot the system in order for this change to take effect.&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2023 18:03:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4776965#M251809</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-02-16T18:03:39Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4784424#M252368</link>
      <description>&lt;P&gt;I was able get a working/valid cert. I had to use openssl. My certificate authority needed the SAN entry. Generating a CSR on the WLC doesn't have an option for SANs.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 20:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4784424#M252368</guid>
      <dc:creator>Chris Terry</dc:creator>
      <dc:date>2023-02-28T20:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4784466#M252370</link>
      <description>&lt;P&gt;Thanks for providing the solution.&amp;nbsp; This helps the community and those whom run into the same issue.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Feb 2023 21:04:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4784466#M252370</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2023-02-28T21:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4982698#M264628</link>
      <description>&lt;P&gt;Hi Experts,&lt;/P&gt;&lt;P&gt;I had a a little bit different query but in connection to this topic itself.&lt;/P&gt;&lt;P&gt;So, in my case I was successfully able to apply third party CA signed cert on WLC 5520 and all works on https FQDN connection. CSR was generated with FQDN name in CN field via openssl. So, now https connection to WLC mgmt IP is non-cert checked session, and https to WLC FQDN is cert checked secure session. How to not allow https to WLC IP directly and cease it off post the WLC FQDN session works fine with third party CA signed cert.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 02:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4982698#M264628</guid>
      <dc:creator>pwaghmare</dc:creator>
      <dc:date>2023-12-21T02:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco 5520 WLC WebAdmin Cert</title>
      <link>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4982976#M264632</link>
      <description>&lt;P&gt;There's no easy way to that.&amp;nbsp; It would require filtering the TLS header for the SNI field and allowing the FQDN SNI while dropping the IP SNI.&amp;nbsp; But TLS 1.3 introduces encrypted SNI so eventually even that won't be possible but for today if you wanted to do that for 5520 that's how you would do it.&lt;/P&gt;
&lt;P&gt;Otherwise you just need to educate your users or apply policy to their devices blocking access to the direct IP URL.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2023 11:34:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/cisco-5520-wlc-webadmin-cert/m-p/4982976#M264632</guid>
      <dc:creator>Rich R</dc:creator>
      <dc:date>2023-12-21T11:34:18Z</dc:date>
    </item>
  </channel>
</rss>

