Make certificate templates
/certificate
add name=ca-template common-name=myCa key-usage=key-cert-sign,crl-sign
add name=server-template common-name=server
add name=client1-template common-name=client1
add name=client2-template common-name=client2
Sign certificates
and add CRL url. We
will use IP address of the server as CRL URL.
/certificate
sign ca-template
ca-crl-host=10.5.101.16 name=myCa
sign server-template ca=myCa
name=server
sign client1-template ca=myCa
name=client1
sign client2-template ca=myCa
name=client2
Note: If
signing certificates on mipbe cpu based devices(RB7xx,RB2011,RB9xx) then this
process might take a while depending on key-size of specific certificate. With
values 4k and higher it might take a substantial time to sign this specific
certificate.
If certificate does
not have T flag then you need to set it as trusted before using
it:
/certificate
set myCa trusted=yes
set server trusted=yes
Export client
certificates with keys
and CA certificate:
/certificate export-certificate myCa
/certificate export-certificate
client1 export-passphrase=xxxxxxxx
/certificate export-certificate
client2 export-passphrase=xxxxxxxx
Now these exported files can be imported on
client machines.
If everything went well you should have
something like this:
[admin@pe0] /certificate> print
Flags: K - private-key, D - dsa, L -
crl, C - smart-card-key,
A - authority, I - issued, R -
revoked, E - expired, T - trusted
#
NAME
COMMON-NAME FINGERPRINT
0 K L A T myCa myCa 7fa636e6576495fe78f1a4...
1 K I
T server server cf0650a291bf4685f2fbd3...
2 K
I client1 client1 26233de30e89b203b946ab...
3 K
I client2 client2 cf172b62201befaf8d8966...
Import
certificates
To import newly created certificates to your
router, first you have to upload server.crt and server.key files to the router
via FTP. Now go to /certificatesubmenu and run following commands:
[admin@test_host] /certificate>
import file-name=server.crt
passphrase:
certificates-imported: 1
private-keys-imported: 0
files-imported: 1
decryption-failures: 0
keys-with-no-certificate: 0
[admin@test_host] /certificate>
import file-name=server.key
passphrase:
certificates-imported: 0
private-keys-imported: 1
files-imported: 1
decryption-failures: 0
keys-with-no-certificate: 0
If everything is imported properly then
certificate should show up with KT flag.
Create Server
/interface sstp-server server set
certificate=server
/interface sstp-server server set
enabled=yes
/interface sstp-server server print
enabled: no
port: 443
max-mtu: 1500
max-mru: 1500
mrru: disabled
keepalive-timeout: 60
default-profile: default
authentication:
pap,chap,mschap1,mschap2
certificate: none
verify-client-certificate: no
force-aes: no
SSTP CLIENT
Komentar
Posting Komentar