<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Clearpass Archives - Network Guy</title>
	<atom:link href="https://networkguy.de/tag/clearpass/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Share your knowledge!</description>
	<lastBuildDate>Sat, 05 Mar 2022 08:38:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://networkguy.de/wp-content/uploads/2016/09/cropped-og-image-32x32.jpg</url>
	<title>Clearpass Archives - Network Guy</title>
	<link></link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">35051042</site>	<item>
		<title>Aruba Clearpass problem with certificate chain</title>
		<link>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/</link>
					<comments>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/#comments</comments>
		
		<dc:creator><![CDATA[Phillip]]></dc:creator>
		<pubDate>Sat, 05 Mar 2022 08:25:56 +0000</pubDate>
				<category><![CDATA[Aruba]]></category>
		<category><![CDATA[HPE Networking]]></category>
		<category><![CDATA[Clearpass]]></category>
		<category><![CDATA[HPE]]></category>
		<guid isPermaLink="false">https://networkguy.de/?p=2707</guid>

					<description><![CDATA[<p>Hello Guys, Today I am going to talk about a problem with my company&#8217;s wildcard certificate. Because I wanted to display the Clearpass captive portal without certificate errors. I tried to import our company wildcard certificate. And in doing so, I encountered the following problem: Here we have the problem that the certificate chain for [&#8230;]</p>
<p>The post <a href="https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/">Aruba Clearpass problem with certificate chain</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hello Guys,</p>
<p>Today I am going to talk about a problem with my company&#8217;s wildcard certificate.</p>
<p>Because I wanted to display the Clearpass captive portal without certificate errors. I tried to import our company wildcard certificate. And in doing so, I encountered the following problem:</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg"><img fetchpriority="high" decoding="async" class="alignnone size-full wp-image-2730" src="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg" alt="" width="1011" height="549" srcset="https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError.jpg 1011w, https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError-300x163.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CertificateChainError-768x417.jpg 768w" sizes="(max-width: 1011px) 100vw, 1011px" /></a></p>
<p>Here we have the problem that the certificate chain for the Clearpass is in the wrong order. Many systems like the Aruba Mobility Controller or Sophos SG don&#8217;t seem to care if the chain goes from root to server certificate or from server certificate to root CA. But not the Clearpass :D</p>
<h4><strong>The solution</strong></h4>
<p>The only thing that helps here is to rebuild the certificate chain. First, we need the root CA and all sub CAs. The easiest way to get this is from a system where the wildcard certificate is already integrated. For example, the Sophos SG Firewall.</p>
<h5><strong>extract the root and sub CAs</strong></h5>
<p>To do this, simply go to the Sophos SG webadmin or user portal  with the Google Chrome browser and display the certificate.</p>
<p>Als erstens Exportierst du das Root CA.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg"><img decoding="async" class="alignnone size-full wp-image-2710" src="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg" alt="" width="458" height="576" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cert1.jpg 458w, https://networkguy.de/wp-content/uploads/2022/03/Cert1-239x300.jpg 239w" sizes="(max-width: 458px) 100vw, 458px" /></a></p>
<p>Click on the Root CA. Than details and Copy to files</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.jpg"><img decoding="async" class="alignnone size-large wp-image-2711" src="https://networkguy.de/wp-content/uploads/2022/03/CA1-1024x465.jpg" alt="" width="1024" height="465" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1-1024x465.jpg 1024w, https://networkguy.de/wp-content/uploads/2022/03/CA1-300x136.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA1-768x348.jpg 768w, https://networkguy.de/wp-content/uploads/2022/03/CA1.jpg 1144w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></p>
<p>Save the certifiact as base 64</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2712" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg" alt="" width="573" height="574" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.2.jpg 573w, https://networkguy.de/wp-content/uploads/2022/03/CA1.2-300x300.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA1.2-150x150.jpg 150w" sizes="(max-width: 573px) 100vw, 573px" /></a></p>
<p>save it under the name CA1.cer</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2713" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg" alt="" width="574" height="664" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.3.jpg 574w, https://networkguy.de/wp-content/uploads/2022/03/CA1.3-259x300.jpg 259w" sizes="(max-width: 574px) 100vw, 574px" /></a></p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2714" src="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg" alt="" width="569" height="595" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA1.4.jpg 569w, https://networkguy.de/wp-content/uploads/2022/03/CA1.4-287x300.jpg 287w" sizes="(max-width: 569px) 100vw, 569px" /></a></p>
<p>Repeat the steps for the two sub CAs.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2715" src="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg" alt="" width="924" height="595" srcset="https://networkguy.de/wp-content/uploads/2022/03/CA2and3.jpg 924w, https://networkguy.de/wp-content/uploads/2022/03/CA2and3-300x193.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/CA2and3-768x495.jpg 768w" sizes="(max-width: 924px) 100vw, 924px" /></a></p>
<h5><strong>build the certificate chain</strong></h5>
<p>Now you have to detach the single certificate and the private key from the wildcard package without a certificate chain. The easiest way to do this is with openssl in a Linux machine. I have a Windows subsystem for Linux on my computer. Copy the wildcard certificate and the 3 certificates CA1 to CA3 into the home directory of the Linux machine.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2717" src="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg" alt="" width="953" height="314" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux1.jpg 953w, https://networkguy.de/wp-content/uploads/2022/03/Linux1-300x99.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux1-768x253.jpg 768w" sizes="(max-width: 953px) 100vw, 953px" /></a></p>
<p>For Ubuntu:<br />
Detach the public and private keys from the certificate.</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">sudo -s
openssl pkcs12 -in networkguy.pfx -clcerts -nokeys -out networkguyStar.cer
openssl pkcs12 -in networkguy.pfx -nocerts -nodes  -out networkguyStar.key
</pre>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2718" src="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg" alt="" width="995" height="179" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux2.jpg 995w, https://networkguy.de/wp-content/uploads/2022/03/Linux2-300x54.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux2-768x138.jpg 768w" sizes="(max-width: 995px) 100vw, 995px" /></a></p>
<p>With <strong>ll</strong> you can now see that you now have the public key &#8220;networkguyStar.cer&#8221; and the private key &#8220;networkguyStar.key&#8221;.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2719" src="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg" alt="" width="995" height="279" srcset="https://networkguy.de/wp-content/uploads/2022/03/Linux3.jpg 995w, https://networkguy.de/wp-content/uploads/2022/03/Linux3-300x84.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Linux3-768x215.jpg 768w" sizes="(max-width: 995px) 100vw, 995px" /></a></p>
<p>Now we need to build a new wildcard certificate where the certificate chain has the order required by the Clearpass. The Clearpass wants the wildcard certificate first, then the sub CAs and finally the root CA.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2727" src="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg" alt="" width="1025" height="508" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cain1-1.jpg 1025w, https://networkguy.de/wp-content/uploads/2022/03/Cain1-1-300x149.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Cain1-1-768x381.jpg 768w" sizes="(max-width: 1025px) 100vw, 1025px" /></a></p>
<p>The following command is required for this:</p>
<pre class="EnlighterJSRAW" data-enlighter-language="generic">cat networkguyStar.cer CA3.cer CA2.cer CA1.cer &gt; networkguyStarfullchain.cer</pre>
<p>Now we have created a chain of certificates suitable for the Clearpass. :D</p>
<h4><strong>The Clearpass does not trust the Root or Sub CA</strong></h4>
<p>If the wildcard certificate contains a root or sub CA that Clearpass does not know, this must be imported. For this we can simply use the CA1.cer to CA3.cer.<br />
To do this, go to Administration / Certificates / Trust List in the Policy Manager and then click on Add. Select Usage under -Select to Add&#8211; Other. Do this with CA1.cer, CA2.cer and CA3.cer.</p>
<p><a href="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-2722" src="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg" alt="" width="922" height="274" srcset="https://networkguy.de/wp-content/uploads/2022/03/Cain2.jpg 922w, https://networkguy.de/wp-content/uploads/2022/03/Cain2-300x89.jpg 300w, https://networkguy.de/wp-content/uploads/2022/03/Cain2-768x228.jpg 768w" sizes="(max-width: 922px) 100vw, 922px" /></a></p>
<p>Then have fun with your Clearpass. (A cool product) :D</p>
<p style="text-align: center;"><strong>Have a nice day!</strong></p>
<p>The post <a href="https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/">Aruba Clearpass problem with certificate chain</a> appeared first on <a href="https://networkguy.de">Network Guy</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://networkguy.de/aruba-clearpass-problem-with-certificate-chain/feed/</wfw:commentRss>
			<slash:comments>6</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2707</post-id>	</item>
	</channel>
</rss>
