1/6: Install OpenSSL.
OpenSSL is a powerful tool for managing SSL/TLS certificates and cryptographic keys.
OpenSSL is needed to extract and manipulate the certificates and keys generated during this process. The ASUS AX3000 router requires specific formats that OpenSSL can generate.
Download the latest version of OpenSSL for Windows 64-bit here.
Install OpenSSL in the default directory:
C:\Program Files\OpenSSL-Win64
.Ensure the installation adds OpenSSL to your system’s PATH (optional but recommended for command-line access).
2/6: Request a New SSL Certificate.
We need to create a certificate request using Windows Certificate Manager (certlm.msc) and specify details such as the domain name, IP address, and exportable private key.
The certificate request ensures the router will be issued a trusted certificate by the internal CA. This certificate will allow secure HTTPS connections.
Open Certificate Manager:
- Press
Win + R
, typecertlm.msc
and press Enter.
- Press
Request Certificate:
Navigate to Personal > Certificates.
Right-click an empty area > All Tasks > Request New Certificate.
Select Policy.
For Certificate Enrollment Policy, choose Active Directory Enrollment Policy.
Click Next.
Choose Template.
Select an appropriate template, such as
Web Server
.When prompted for configuration, click the URL/link.
Configure Certificate Properties:
Subject Tab:
Change
Full DN
toCommon Name
.Set the Value to router’s hostname (e.g.
gateway
).Alternative Names:
Add DNS: (e.g.
gateway
).Add DNS: (e.g.
gateway.internal.company.com
).Add IP Address (IPv4): (e.g.
10.0.0.1
).
General Tab:
- Friendly Name:
Router
(to make it easily identifiable in Certificate Manager).
- Friendly Name:
Private Key Tab:
- Ensure Private Key is Exportable (important for later steps).
Click Enroll to generate the certificate.
Confirm Success:
- Wait for the process to complete and verify that the new certificate appears in Personal > Certificates.
3/6: Export the Certificate as PFX.
Now, we need to export the generated certificate and its private key to a PFX file format. The PFX file combines the certificate and private key, which is necessary for importing into the router.
Locate the newly issued certificate (e.g.
GATEWAY
) in Personal > Certificates.Right-click the certificate > All Tasks > Export.
Use the Certificate Export Wizard:
Select Yes, export the private key.
Choose PFX (Personal Information Exchange) format.
Set a password to protect the private key during export.
Save the file (e.g. as
Router.pfx
) on your desktop.
4/6: Extract Private Key and Certificate using OpenSSL.
We will use OpenSSL to extract the private key and certificate from the Router.pfx
file. These files are required for the router configuration.
The router doesn’t accept PFX files directly. We need to split the files into its components: the private key and the certificate.
privatekey.pem
: The private key.
cert.pem
: The certificate.
Open Command Prompt as Administrator:
Navigate to the OpenSSL directory:
cd C:\Program Files\OpenSSL-Win64\bin
Extract the Private Key:
Run:
openssl pkcs12 -in C:\path_to\Router.pfx -nocerts -out C:\path_to\privatekey.pem -nodes
Enter the password set during the
.pfx
export.
Extract the Public Certificate:
Run:
openssl pkcs12 -in C:\path_to\Router.pfx -clcerts -nokeys -out C:\path_to\cert.pem
5/6: Upload Certificates to the Router.
Now we need to upload the private key and certificate files to the router to enable secure HTTPS access.
Custom certificates ensure that your router’s HTTPS interface is trusted, removing browser warnings and improving security.
Login to the router’s admin interface (e.g. routerlogin.local).
Navigate to WAN > DDNS (or similar, depending on your router model).
Under HTTPS/SSL Certificate, select Import Your Own Certificate.
Upload the files:
Private key: Select
privatekey.pem
.SSL Certificate: Select
cert.pem
.
Apply the changes and restart the router if needed.
6/6: Verify HTTPS Access.
Finally, test the router’s new SSL certificate to ensure it’s correctly applied. It’s important to confirm that HTTPS access to the router is secure and trusted.
Open a web browser and test:
The router’s hostname (e.g. gateway.internal.company.com:8443).
The router’s IP address (e.g. https://10.0.0.1:8443).
Troubleshoot Issues:
If you see a
Your clock is behind
error, synchronise your PC’s timezone with the certificate server.If the certificate doesn’t work immediately, toggle the HTTPS/SSL certificate settings (disable, re-enable or restart the router).
You may need to close and re-open your web browser.
Conclusion
By following this guide, you’ve successfully issued and installed a custom SSL certificate for your router using AD CS and OpenSSL.
This setup not only secures your router’s admin interface but also builds your understanding of SSL certificate management and encryption.