requirements of your CA
Example
To import a certificate and the respective private key already uploaded on the router:
[admin@MikroTik] certificate> import
passphrase: xxxx
certificates-imported: 1
private-keys-imported: 1
files-imported: 2
decryption-failures: 0
keys-with-no-certificate: 1
[admin@MikroTik] certificate> print
Flags: K - decrypted-private-key, Q - private-key, R - rsa, D - dsa
0 QR name="cert1" subject=C=LV,ST=.,O=.,CN=cert.test.mt.lv
issuer=C=LV,ST=.,O=.,CN=third serial-number="01"
invalid-before=sep/17/2003 11:56:19 invalid-after=sep/16/2004 11:56:19
ca=yes
[admin@MikroTik] certificate> decrypt
passphrase: xxxx
keys-decrypted: 1
[admin@MikroTik] certificate> print
Flags: K - decrypted-private-key, Q - private-key, R - rsa, D - dsa
0 KR name="cert1" subject=C=LV,ST=.,O=.,CN=cert.test.mt.lv
issuer=C=LV,ST=.,O=.,CN=third serial-number="01"
invalid-before=sep/17/2003 11:56:19 invalid-after=sep/16/2004 11:56:19
ca=yes
[admin@MikroTik] certificate>
Now the certificate may be used by HotSpot servlet:
[admin@MikroTik] ip service> print
Flags: X - disabled, I - invalid
#
NAME
PORT
ADDRESS
CERTIFICATE
0
telnet
23
0.0.0.0/0
1
ftp
21
0.0.0.0/0
2
www
8081
0.0.0.0/0
3
hotspot
80
0.0.0.0/0
4
ssh
22
0.0.0.0/0
5
hotspot-ssl
443
0.0.0.0/0
none
[admin@MikroTik] ip service> set hotspot-ssl certificate=
cert1
none
[admin@MikroTik] ip service> set hotspot-ssl certificate=cert1
[admin@MikroTik] ip service> print
Flags: X - disabled, I - invalid
#
NAME
PORT
ADDRESS
CERTIFICATE
0
telnet
23
0.0.0.0/0
1
ftp
21
0.0.0.0/0
2
www
8081
0.0.0.0/0
3
hotspot
80
0.0.0.0/0
4
ssh
22
0.0.0.0/0
5
hotspot-ssl
443
0.0.0.0/0
cert1
[admin@MikroTik] ip service>
Page 565 of 695
Copyright 1999-2007, MikroTik. All rights reserved. Mikrotik, RouterOS and RouterBOARD are trademarks of Mikrotikls SIA.
Other trademarks and registred trademarks mentioned herein are properties of their respective owners.