Step 3 Send the CSR file to a Certificate Authority (CA) of your choice.
Note Once you have generated and sent the CSR file for certification, do not use the genkey command again to generate a new key on the same Prime Infrastructure server. If you do, importing the signed certificate file will result in mismatches between keys in the file and on the server.
Step 4 You will receive a signed certificate file with the same filename, but with the file extension CER, from the CA. Before continuing, ensure:
There is only one CER file. In some cases, you may receive chain certificates as individual files. If so, concatenate these files into a single CER file. Any blank lines in the CER file are removed. Step 5 At the command line, copy the CER file to the backup repository. For example:
Step 7 Restart the Prime Infrastructure server by issuing the following commands in this order:
- ncs stop
- ncs start
Step 8 If the Certificate Authority who signed the certificate is not already a trusted CA: Instruct users to add the certificate to their browser trust store when accessing the Prime Infrastructure login page.
Importing a Certificate Authority (CA) Certificate and Key
Step 1 At the command line, log in using the administrator ID and password and enter the following command:
aliasname is a short name given for this CA certificate. ca-cert-filename is the CA certificate file name. repositoryname is the repository name configured in Prime Infrastructure where the ca-cert-filename is hosted. Step 2 To import an RSA key and signed certificate to Prime Infrastructure, enter the following command in admin mode:
key-filename is the RSA private key file name. cert-filename is the certificate file name. repositoryname is the repository name configured in Prime Infrastructure where the key-file and cert-file are hosted. Step 3 Restart the Prime Infrastructure server by issuing the following commands in this order:
Copy the mycert file to the CA and get the CA back. Copy all certificates together for a chain which needs to be imported in the following order:
*Intermediate CA cert *
*Root CA cert *
Additional we need the p7b file from the CA which contains the chain.
ncs key importcacert mycert.cer mycert.cer reporitory myrepo
The restart is necessary before we import the p7b file. Otherwise we might get an
Import p7b file
ncs key importsignedcert mycert.p7b repository myrep
Heya all. I work for a small private college. We recently extended the coverage in one of our Greek houses by moving the existing AIR-CAP2602I-A-K9 to the 3rd floor and adding a AIR-CAP702W-A-K9 on the ground floor. The 2602 is connec...
Hallo,I met a problem , today I configured a new AP 2802I, I upgraded version to Mobility Express version, because I need a master AP to manage another 5 AP in the LAN. I can login into GUI page after reboot, ...
Hi everyone,I just wanted to share a recent experience that may avoid you some headaches. Last november we upgraded one of our WLCs from 8.2.166 to the still (Feb-18-2020) recommended version 8.5.151. A couple of days after the upgrade some users sta...
BRIEF- Anyone else seeing WiFi clients issuing bursts of DHCP Requests which trigger 'ip dhcp snooping rate limit xx' thresholds on Catalysts? DETAIL- The flock of Catalyst 2960X at the access-layer have several hardening features enabled, incl...
It looks like there is no real need to enable "HA SKU secondary unit" on the backup controller, since I could just simply add the same amount of licenses to both WLCs since my APs will only be joined to 1 WLC at a time? Am I correct? or am I misinter...