- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-12-2021 01:17 AM
Hi.
I've messed up my web access to the unleashed interface page by installing the wrong certificate (Cloudflare) in the administration area, now I'm not able to access my R600 AP by browser anymore (Unleashed ver. 200.7.10.202 build 127).
When I try to access http://unleashed.ruckuswireless.com/ or http://10.110.0.1/admin/login.jsp I get redirected to the "Not secure" site http://cloudflare/tohttps.jsp and then https://cloudflare/
- I've tried to set up my "hosts" file on windows to "10.110.0.1 cloudflare" so I could maybe access the interface again,
- I've turned off the "Warn about certificate address mismatch*" in the Advanced - Internet Option
- I've installed the same certificate to the "Trusted root cert auth."
- ... to no avail
I even went through all the Unleashed CLI documentation and found nothing on
- resetting the default certificate or
- manually setting "https:/unleashed/" for the path of the web interface instead of "http://unleashed.ruckuswireless.com/"
Can anything still save me from resetting the whole AP to factory defaults?
Any help would be strongly appreciated.
Best regards to all!
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-12-2021 06:09 AM
Hey guys thanx for the effort. I just came across this weird browser "Pale Moon" which let me bypass this certificate issue that the modern browser today just won't let go. So I've managed to log in and reset the old Ruckus certificate. Everything works again.
Well if I'm curious how things work I give it a try and often break things along the way. I just love a challenge like that from time to time 😄 Sorry for the nuisance.
Best regards again.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
08-10-2022 08:53 AM
Thanks; after my post I played with it a bit more and came to pretty much the same conclusions. Rather than using Let's Encrypt for this, I'm using a local CA (https://smallstep.com/blog/build-a-tiny-ca-with-raspberry-pi-yubikey/), one benefit of which is that I can set the AP's IP address as a SAN on the cert. That does mean, though, that I renew the cert daily--but a 3 am reboot isn't really problematic. Though I continue to think that's very poor design (on Ruckus' part) to require minutes of downtime just to install a cert.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
11-12-2021 06:09 AM
Hey guys thanx for the effort. I just came across this weird browser "Pale Moon" which let me bypass this certificate issue that the modern browser today just won't let go. So I've managed to log in and reset the old Ruckus certificate. Everything works again.
Well if I'm curious how things work I give it a try and often break things along the way. I just love a challenge like that from time to time 😄 Sorry for the nuisance.
Best regards again.