Wireless Access

last person joined: 22 hours ago 

Access network design for branch, remote, outdoor, and campus locations with HPE Aruba Networking access points and mobility controllers.
Expand all | Collapse all

Replacing mobility master default https cert

This thread has been viewed 55 times
  • 1.  Replacing mobility master default https cert

    Posted Sep 04, 2019 11:58 AM

    I've just uploaded a new cert (m and CA chain onto our dev mobility master.

     

    Problem is can;t see what I change to tell the master to use our cert instead of the default one. Is it . the Captive Portal  option in Conf/System/More/General ?

     

    A



  • 2.  RE: Replacing mobility master default https cert

    Posted Sep 04, 2019 12:08 PM

    Also,  When I then go to the controllers why do I have to pick a different cert name for same certs that I uploaded onto the mobility master. This is 8.5.0 BTW

     



  • 3.  RE: Replacing mobility master default https cert

    EMPLOYEE
    Posted Sep 04, 2019 01:24 PM

    Configuration> System> More> General.

    Screenshot 2019-09-04 at 12.22.39.png

    The friendly name has to be different, because that is how you can tell which certificate you are choosing from the dropdown.



  • 4.  RE: Replacing mobility master default https cert

    Posted Sep 04, 2019 01:35 PM
    Ok , in our case we’ve got 1cert with multiple SANs and we’re using it on both the mobility master and the controllers

    Sent from my iPhone


  • 5.  RE: Replacing mobility master default https cert

    EMPLOYEE
    Posted Sep 04, 2019 01:41 PM

    Is this for Captive Portal?  Captive Portal certfs on MDs/MMs only require a single fqdn.  Only Captive Portal certificates on ClearPass need multiple SANs.



  • 6.  RE: Replacing mobility master default https cert

    Posted Sep 05, 2019 03:58 AM

    No, its for the cert you see when connecting to the management GUI

     

     



  • 7.  RE: Replacing mobility master default https cert

    EMPLOYEE
    Posted Sep 05, 2019 05:27 AM

    That would be under Configuration> System> Admin Authentication Options> Web Authentication> Server Certificate:

    Screenshot 2019-09-05 at 04.25.40.png