Redpine Signals, Inc.
Page 31
R
R
S
S
-
-
W
W
C
C
-
-
3
3
0
0
1
1
E
E
v
v
a
a
l
l
u
u
a
a
t
t
i
i
o
o
n
n
B
B
o
o
a
a
r
r
d
d
U
U
s
s
e
e
r
r
G
G
u
u
i
i
d
d
e
e
V
V
e
e
r
r
s
s
i
i
o
o
n
n
2
2
.
.
5
5
1
1
2.
Issue the following commands:
./configure
make
make install
3.
The radius server is now installed in the PC (D). A folder “raddb” is
created inside /usr/local/etc. Replace this folder with the raddb folder
provided inside Redpine‟s software package
RS.WSC.x.x.GENR.x.x.x.x.x.x\ Software\Applications\Radius_server\
4.
To start the Radius Server, issue the below command on the Linux
terminal
radiusd –X
NOTE: The user can use other Radius Server software also for evaluation. This
radius server is provided for reference.
Important files for the Radius_Server:
1.
RS.WSC.x.x.GENR.x.x.x.x.x.x\Software\Applications\Radius_server\raddb
\certs\ wifiuser.pem
This is the default certificate file provided with the software package. The
file used for the parameter <
certificate>
in the command
at+rsi_cert
,
when EAP-TLS mode is used in the module. This certificate file should be
present in PC(P).
NOTE: To generate a new certificate, the below process may be used in the Linux
PC where
freeradius-server
was installed.
Create Normal Certificate
mkdir new_certs
cd new_certs/
mkdir sslcert
chmod 0700 sslcert
cd sslcert
mkdir certs private
echo „100001‟ >serial
touch certindex.txt
vi openssl.cnf
/* CA root */
openssl req –new –x509 –extensions v3_ca –keyout private/cakey.pem –out
cacert.pem –days 365 –config ./openssl.cnf
/* Certificates Request */
openssl req –new –nodes –out redpine-req.pem –keyout private/redpine-key.pem –