<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Certificate problems when deploying new 12.8.2.2 OVA in Aerohive Migrated Content</title>
    <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76809#M7237</link>
    <description>&lt;P&gt;When the hostname of the VA is changed, the certificate will not be regenerated. Ultimately this doesn't change anything, because the root CA isn't trusted either. There should always be a way to proceed to the requested site regardless of the untrusted cert, could you tell me what browsers you've tried this on? For instance we use Firefox when we deploy on premises HiveManagers to test with, and we always have an option to proceed despite the certificate error. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to avoid these messages is to use a commercially signed certificate. I suggest looking here if you're interested, very fairly priced (PositiveSSL is what you want to look at): https://www.namecheap.com/security/ssl-certificates/comodo.aspx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will want to use an CSR form external to the HM GUI, here is some relevant information on that front:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The certificate bundle imported should be a PEM file. The certificate must be from a commercial, publicly trusted CA. Only commercial CAs that are already in a browser's trust store and conform to the commercial Baseline Requirements (BRs) are supported.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PEM file needs to contain the server certificate, all intermediate certificates in order of chain of trust, the root CA certificate and then lastly the private key in exactly that order.&amp;nbsp;This can usually be checked in a text editor or can be checked via OpenSSL otherwise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No success message is currently observed in the UI when a certificate has been uploaded successfully, just so you are aware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something else to keep in mind, SAN certificates containing multiple domain names are not supported as the CN needs to be used (a single SAN present with the same value of the CN is expected and normal).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once a PEM file meeting these requirements has been uploaded, the HiveManager VA should be rebooted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Please check the path to the root and intermediates by reviewing the subject and issuer down the list in OpenSSL&amp;nbsp;(the root will have the same subject and issuer).&amp;nbsp;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl crl2pkcs7 -nocrl -certfile example.pem | openssl pkcs7 -print_certs -noout&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.example.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*) If you do not observe the server certificate, all intermediate certificates in order of chain of trust, and then the root CA certificate, please correct this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Also confirm that public and private key are matched pairs. Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl rsa -noout -modulus -in example.pem | openssl sha256&amp;nbsp;&lt;/P&gt;&lt;P&gt;dd8a668dc2e3e45e0b5c1b62b5bf9ef618d41c9e3c96dc8d9e0eabe56bde3265&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl x509 -noout -modulus -in example.pem | openssl sha256&amp;nbsp;&lt;/P&gt;&lt;P&gt;dd8a668dc2e3e45e0b5c1b62b5bf9ef618d41c9e3c96dc8d9e0eabe56bde3265&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The private key for the server certificate must be in PKCS8 and not PKCS1 format, that is, you must observe BEGIN PRIVATE KEY and not BEGIN RSA PRIVATE KEY.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This can be checked in a text editor when in PEM format or can be checked via OpenSSL otherwise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 04 Feb 2019 23:07:42 GMT</pubDate>
    <dc:creator>samantha_lynn</dc:creator>
    <dc:date>2019-02-04T23:07:42Z</dc:date>
    <item>
      <title>Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76808#M7236</link>
      <description>&lt;P&gt;Ive deployed the 12.8.2.2 OVA to VMWare ESXi 6.7, as Im sure everyone is aware, in 6.7 you cannot pre-configure IP address and Hostname when deploying the OVA any more, this means you get stuck with a DHCP address and "hivemanager-ng.aerohive.com" as the hostname. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive tried changing these details via the HMVA Management portal, and while it does change the IP and Hostname, it doesnt seem to change the certificate that gets created when deploying the OVA. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Im now stuck with all browsers blocking access because the valid names on the cert are the DHCP address and "hivemanager-ng.aerohive.com". When adding an exception rule to the browsers to trust the cert, you get looped back to "This Connection is not Secure" and cannot load the controller home page.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have managed to get the homepage loaded by changing back to the original DHCP address and creating an entry in my local HOSTS file for "hivemanager-ng.aerohive.com", this is less than ideal though as it means the portal can only be accessed from my workstation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would really appreciate any assistance as im stuck now and cannot find a way forward.&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 15:10:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76808#M7236</guid>
      <dc:creator>michael_bliss</dc:creator>
      <dc:date>2019-02-04T15:10:00Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76809#M7237</link>
      <description>&lt;P&gt;When the hostname of the VA is changed, the certificate will not be regenerated. Ultimately this doesn't change anything, because the root CA isn't trusted either. There should always be a way to proceed to the requested site regardless of the untrusted cert, could you tell me what browsers you've tried this on? For instance we use Firefox when we deploy on premises HiveManagers to test with, and we always have an option to proceed despite the certificate error. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to avoid these messages is to use a commercially signed certificate. I suggest looking here if you're interested, very fairly priced (PositiveSSL is what you want to look at): https://www.namecheap.com/security/ssl-certificates/comodo.aspx&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will want to use an CSR form external to the HM GUI, here is some relevant information on that front:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The certificate bundle imported should be a PEM file. The certificate must be from a commercial, publicly trusted CA. Only commercial CAs that are already in a browser's trust store and conform to the commercial Baseline Requirements (BRs) are supported.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The PEM file needs to contain the server certificate, all intermediate certificates in order of chain of trust, the root CA certificate and then lastly the private key in exactly that order.&amp;nbsp;This can usually be checked in a text editor or can be checked via OpenSSL otherwise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No success message is currently observed in the UI when a certificate has been uploaded successfully, just so you are aware.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Something else to keep in mind, SAN certificates containing multiple domain names are not supported as the CN needs to be used (a single SAN present with the same value of the CN is expected and normal).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once a PEM file meeting these requirements has been uploaded, the HiveManager VA should be rebooted.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1) Please check the path to the root and intermediates by reviewing the subject and issuer down the list in OpenSSL&amp;nbsp;(the root will have the same subject and issuer).&amp;nbsp;Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl crl2pkcs7 -nocrl -certfile example.pem | openssl pkcs7 -print_certs -noout&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/OU=Domain Control Validated/OU=PositiveSSL Wildcard/CN=*.example.com&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Domain Validation Secure Server CA&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=GB/ST=Greater Manchester/L=Salford/O=COMODO CA Limited/CN=COMODO RSA Certification Authority&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;subject=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;issuer=/C=SE/O=AddTrust AB/OU=AddTrust External TTP Network/CN=AddTrust External CA Root&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;*) If you do not observe the server certificate, all intermediate certificates in order of chain of trust, and then the root CA certificate, please correct this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) Also confirm that public and private key are matched pairs. Example:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl rsa -noout -modulus -in example.pem | openssl sha256&amp;nbsp;&lt;/P&gt;&lt;P&gt;dd8a668dc2e3e45e0b5c1b62b5bf9ef618d41c9e3c96dc8d9e0eabe56bde3265&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;openssl x509 -noout -modulus -in example.pem | openssl sha256&amp;nbsp;&lt;/P&gt;&lt;P&gt;dd8a668dc2e3e45e0b5c1b62b5bf9ef618d41c9e3c96dc8d9e0eabe56bde3265&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3) The private key for the server certificate must be in PKCS8 and not PKCS1 format, that is, you must observe BEGIN PRIVATE KEY and not BEGIN RSA PRIVATE KEY.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This can be checked in a text editor when in PEM format or can be checked via OpenSSL otherwise.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 04 Feb 2019 23:07:42 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76809#M7237</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-02-04T23:07:42Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76810#M7238</link>
      <description>&lt;P&gt;Thank you for the detailed response. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive tried with IE, Edge, FF and Chrome. Its odd behavior for sure, normally if I run into cert issues on a site, I can add an exception and continue as normal, but for some reason this isnt the case with 12.8.2.2.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently only have a wildcard cert and our SCM processes are rather slow but ill see if I can get it moving so that we can get this sorted.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the meantime, I have access to the console via a HOSTS file entry, would it be ok to import the VHM data and start migrating AP's to the new controller, or should I wait until everything is sorted?&lt;/P&gt;</description>
      <pubDate>Tue, 05 Feb 2019 15:24:41 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76810#M7238</guid>
      <dc:creator>michael_bliss</dc:creator>
      <dc:date>2019-02-05T15:24:41Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76811#M7239</link>
      <description>&lt;P&gt;Thank you for your patience, I've been asking around to see what our best course of action would be and the consensus is that the best path would be to redeploy the HiveManager, let it pull an address from the DHCP server, then assign the address it pulls statically to the HiveManager. Is that something we could try?&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 02:46:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76811#M7239</guid>
      <dc:creator>samantha_lynn</dc:creator>
      <dc:date>2019-02-08T02:46:24Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76812#M7240</link>
      <description>&lt;P&gt;Good Morning, I think that will get me to where I am now. I can access the new controller via aerohive-ng.aerohive.com (entry in hosts) and sign in successfully.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive imported the VHM file from my old controller and all settings have moved across. I then set one of my AP's to Managed but for what ever reason, the controller cannot see it. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can ping the AP from the controller and ping the controller from the AP so im not sure why the AP wont go into a managed state. &lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The AP i'm trying to add to Managed has this setting set,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;capwap client server name cloud-ie-cws-4.aerohive.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Ive tried changing it to the IP of my new controller but to no avail. Im busy searching the forum for a solution, hopefully Ill find something.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 13:43:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76812#M7240</guid>
      <dc:creator>michael_bliss</dc:creator>
      <dc:date>2019-02-08T13:43:49Z</dc:date>
    </item>
    <item>
      <title>Re: Certificate problems when deploying new 12.8.2.2 OVA</title>
      <link>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76813#M7241</link>
      <description>&lt;P&gt;Winning!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;https://thehivecommunity.aerohive.com/s/article/CAPWAP-Guide-for-HiveManager-NG&lt;/P&gt;</description>
      <pubDate>Fri, 08 Feb 2019 13:49:54 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/aerohive-migrated-content/certificate-problems-when-deploying-new-12-8-2-2-ova/m-p/76813#M7241</guid>
      <dc:creator>michael_bliss</dc:creator>
      <dc:date>2019-02-08T13:49:54Z</dc:date>
    </item>
  </channel>
</rss>

