User Manual Part 3

Table Of Contents
AP-51xx Access Point Product Reference Guide
4-16
10. Select the Advanced request checkbox from within the Choose Request Type screen and
click Next to continue.
11. From within the Advanced Certificate Requests screen, select the Submit a certificate
request using a base 64 encoded PKCS #10 file or a renewal request using a
base64 encoded PKCS file option. Click Next to continue.
12. Paste the content of certificate in the Saved Request field (within the Submit a Saved
Request screen).
If you do not have administrative privileges, ensure the Web Server option has been
selected from the Certificate Template drop-down menu. Click Submit.
13. Select the Base 64 encoded checkbox option from within the Certificate Issued screen and
select the Download CA Certificate link.
A File Download screen displays prompting the user to select the download location for
the certificate.
14. Click the Save button and save the certificate to a secure location.
15. Load the certificates on the access point
.
16. Open the certificate file and copy its contents into the CA Certificates screen by clicking the
Paste from Clipboard button.
The certificate is now ready to be loaded into the access point’s flash memory.
17. Click the Import root CA Certificate button from within the CA Certificates screen.
18. Verify the contents of the certificate file display correctly within the CA Certificates screen.
19. Open the certificate file and copy its contents into the Self Certificates screen by clicking
the Paste from Clipboard button.
20. Click the Load Certificate button.
21. Verify the contents of the certificate file display correctly within the Self Certificates screen.
The certificate for the onboard Radius authentication of MUs has now been generated and
loaded into the access point’s flash memory.
NOTE An administrator must make sure the Web Server option is available as a
selectable option for those without administrative privileges.
CAUTION Ensure the CA Certificate is loaded before the Self Certificate, or risk
an invalid certificate load.
!