How to Configure 802.1x EAP-TLS to Secure the Wireless Environment with Third-party CA Certificate?
This example shows how to use Android/iOS phone import the third-party certificate to get the wireless connection with 802.1x EAP-TLS protected. We need a certificate which is purchasing by the third-party CA.
1 Generate certificate request on the NXC. Go to CONFIGURATION > Object > Certificate > My certificates, and add a request certificate. In Subject Information, Set the NXC’s IP in the Host IP Address.
In Enrollment Options, select Create a certification request and save it locally for later manual enrollment.
2 Double click the certificate and scroll down the page to copy the Base-64 code, then provide it to the third-party certificate company.
3 After receiving the certificate, import the NXC identity certificate into “My Certificates”, and the REQ certificate will be changed to CERT automatically. Go to CONFIGURATION > Object > Certificate > My Certificates > Import.
4 Import the root CA and Intermediate CA’s certificate (if exits) into “Trusted Certificate”. Go to CONFIGURATION > Object > Certificate > Trusted Certificates > Import.
5 Import the station identity certificate, root CA and Intermediate CA’s certificate (if exits) into the Android/iOS phone. (The station could download the certificates from email, dropbox or a cloud storage space).
Andriod: In step “e”, the Credential use must select Wi-Fi.
iOS: The way is same as import self-signed certificate.
Configure AP profile
1 Go to CONFIGURATION > Object > AP Profile > SSID> Security List, and add a Security profile.
2 Go to CONFIGURATION > Object > AP Profile > SSID> SSID List, and add an SSID profile.
3 Go to CONFIGURATION > Wireless > AP Management > AP Group, and add this SSID into the default group.
Configure Auth. Server
1 Change the certificate to NXC identity certificate from third-party CA. Go to CONFIGURATION > System > Auth. Server > Auth. Server, and the Authentication Server Certificate select NXC.cer.
Test the Result
1 Use Android/iOS phone and connect to the SSID Zyxel-EAPTLS.
Android: In step “c”, please select root CA’s certificate in “CA CERTIFICATE” Column and select station identity certificate in “USER CERTIFICATE”
iOS: In step “e”, please select the station personal certificate from CA.
2 Check the station information On NXC station info. Go to Configuration > Wireless > Station info.
What Could Go Wrong?
1 User must import the certificate correctly on each device.
NXC: Root/Intermediate CA’s certificate > Trust Certificate; NXC’s certificate > My Certificate;
Station: Root/Intermediate CA’s Certificate > Trusted CA list; Stations’ personal certificate > Personal Certificate.
2 When pressing disconnecting on the Android phone, we might need to import the certificates again.
3 Different Android firmware versions may have different certificate importing behavior. Please ensure the certificates are imported successfully.0
- 8.5K All Categories
- 1.6K Nebula
- 71 Nebula Ideas
- 57 Nebula Status and Incidents
- 4.5K Security
- 227 Security Ideas
- 982 Switch
- 46 Switch Ideas
- 879 WirelessLAN
- 24 WLAN Ideas
- 5.1K Consumer Product
- 158 Service & License
- 280 News and Release
- 98 Success Stories
- 61 Security Advisories
- 13 Education Center
- 581 FAQ
- 263 Nebula FAQ
- 160 Security FAQ
- 76 Switch FAQ
- 75 WirelessLAN FAQ
- 7 Consumer Product FAQ
- 34 Documents
- 34 Nebula Monthly Express
- 62 About Community
- 46 Security Highlight