System information

Manual:System/Certificates
123
Status Properties
Property Description
ca-fingerprint (string)
req-fingerprint (string)
status (string) Shows the current status of the client. Idle, pending, requesting etc.
Commands
Command Description
renew (ca_client_name) Renew Ca certificate of specified CA client Name.
Server
Sub-menu: /certificate scep server
OTP
Sub-menu: /certificate scep server otp
Transactions
Sub-menu: /certificate scep server transactions
[ Top | Back to Content ]
Manual:Create Certificates
Following is a step-by-step guide to creating your own CA (Certificate Authority) with openssl on Linux.
Generate certificates
Note: Starting from v5.15 RouterOS supports pkcs8 key format. If you are using older versions, to import
keys in pkcs8 format run command:
openssl rsa -in myKey.key -text and write key output to new file. Upload new file to RouterOS
and import
First step is to build the CA private key and CA certificate pair.
openssl genrsa -des3 -out ca.key 4096
openssl req -new -x509 -days 3650 -key ca.key -out ca.crt
During the process you will have to fill few entries (Common Name (CN), Organization, State or province .. etc).
Created CA certificate/key pair will be valid for 10 years (3650 days).
Now create private-key/certificate pair for the server
openssl genrsa -des3 -out server.key 4096
openssl req -new -key server.key -out server.csr
openssl x509 -req -days 3650 -in server.csr -CA ca.crt -CAkey ca.key -set_serial 01 -out server.crt