Adding Certificate Authority to Cambium PMP450
This guide explains how to add a Certificate Authority (CA) certificate to Cambium PMP450 devices for RADIUS certificate-based authentication.Overview
To enable certificate-based authentication on Cambium PMP450 devices, you need to:- Upload the CA Certificate - So the device trusts certificates signed by your CA
- Generate a Device Certificate - Create a certificate for the specific PMP450 device
- Upload the Device Certificate - Install the device certificate on the PMP450
Prerequisites
- A Certificate Authority (CA) must be created in the system
- Access to the Cambium PMP450 web interface or CLI
- Admin permissions in the RADIUS management system
Step 1: Download the CA Certificate
Via Web Interface
- Navigate to RADIUS → Certificates → Certificate Authority
- Click on your CA to view details
- In the Download section, click “Download Certificate (PEM)”
- For some firmware versions, you may need DER format instead
- Save the file (e.g.,
ca_certificate.pem)
File Format
- PEM format (
.pem,.crt) - Most common, text-based format - DER format (
.der,.cer) - Binary format, may be required for some firmware versions
Step 2: Upload CA Certificate to Cambium PMP450
Method 1: Web Interface (Recommended)
- Log into the PMP450 web interface
- Navigate to Configuration → Security → Certificates
- Path may vary by firmware version:
Configuration → Security → Trusted CA CertificatesSystem → Security → CA CertificatesNetwork → Security → Certificates
- Path may vary by firmware version:
- Click Upload or Import button
- Select the downloaded CA certificate file (
ca_certificate.pem) - Click Apply or Save
- Wait for the upload to complete and verify the CA appears in the trusted CA list
Method 2: CLI (SSH/Telnet)
Step 3: Generate Device Certificate
Create Certificate for PMP450
- Navigate to RADIUS → NAS Devices
- Find and select your PMP450 device
- Click “Generate Certificate” or go to the certificate management section
- Important: Select a Cambium-Compliant template if available
- Ensures 2048-bit key size
- Uses SHA-256 signature algorithm
- Sets Organization to “Cambium”
- Fill in certificate details:
- Common Name: Device MAC address or NAS name
- Subject Alternative Names: Include device IP, MAC, and hostname
- Click Generate
Certificate Requirements for Cambium PMP450
- Key Size: 2048-bit minimum (4096-bit not supported by older firmware)
- Signature Algorithm: SHA-256 (recommended) or SHA-1 (legacy only)
- Organization: Should be “Cambium” for compatibility
- Format: PKCS#12 (.p12/.pfx) with PBE-SHA1-3DES encryption
Step 4: Download Device Certificate (PKCS#12)
- Navigate to the certificate details page
- In the Download section, find “PKCS#12 (Full Chain)”
- Click “Download PKCS#12 (.p12)”
- Save the file (e.g.,
pmp450_device.p12)
PKCS#12 File Contents
The downloaded.p12 file contains:
- Device certificate
- Device private key
- Full CA certificate chain (intermediate + root if applicable)
Password
The PKCS#12 file is encrypted with a password. This password is configured in:- RADIUS → Settings → PKCS#12 Export Password
Step 5: Upload Device Certificate to PMP450
Via Web Interface
- Log into the PMP450 web interface
- Navigate to Configuration → Security → Certificates
- Find “Client Certificate” or “Device Certificate” section
- Click Upload or Import
- Select the downloaded
.p12file - Enter the PKCS#12 password when prompted
- Click Apply or Save
- Verify the certificate is installed and shows as valid
Certificate Validation
After upload, verify:- Certificate shows as Valid
- Certificate expiration date is correct
- Certificate issuer matches your CA
- Certificate Common Name matches the device
Step 6: Configure RADIUS Authentication
Enable Certificate-Based Authentication
- In PMP450 web interface, navigate to Configuration → Security → RADIUS
- Configure RADIUS server settings:
- RADIUS Server IP: Your FreeRADIUS server
- RADIUS Port: 1812 (authentication)
- Shared Secret: Your RADIUS shared secret
- Enable Certificate Authentication or EAP-TLS
- Select the uploaded device certificate
- Apply changes
RADIUS Server Configuration
Ensure your FreeRADIUS server is configured to:- Accept certificate-based authentication
- Trust certificates signed by your CA
- Validate certificate Common Name or Subject Alternative Names
Troubleshooting
CA Certificate Not Accepted
Symptoms:- CA upload fails
- CA shows as invalid
- Device doesn’t trust certificates
- Verify CA certificate format (PEM vs DER)
- Check CA certificate is not expired
- Ensure CA certificate is complete (includes full chain if intermediate CA exists)
- Try DER format if PEM doesn’t work
- Check firmware version compatibility
Device Certificate Not Working
Symptoms:- Certificate uploads but shows as invalid
- RADIUS authentication fails
- Certificate not recognized by device
- Verify certificate was signed by the trusted CA
- Check certificate Common Name matches device identifier
- Ensure PKCS#12 password is correct
- Verify certificate is not expired
- Check certificate key size (2048-bit minimum)
- Ensure PBE-SHA1-3DES encryption was used (system does this automatically)
PKCS#12 Import Fails
Symptoms:- Cannot import .p12 file
- Password error
- Format error
- Verify password is correct (check RADIUS Settings)
- Ensure file is not corrupted (re-download)
- Check firmware version supports PKCS#12 import
- Try regenerating certificate with Cambium-compliant template
- Verify file extension is
.p12or.pfx
RADIUS Authentication Fails
Symptoms:- Certificate installed but RADIUS fails
- Connection rejected
- Verify RADIUS server trusts your CA
- Check certificate Common Name matches RADIUS user configuration
- Verify Subject Alternative Names include device identifiers
- Check RADIUS server logs for specific errors
- Ensure RADIUS server has access to CA certificate for validation
Cambium PMP450 Compatibility Notes
Firmware Versions
- Older firmware (pre-14.x): May require SHA-1 signatures (not recommended)
- Firmware 14.x+: Supports SHA-256 (recommended)
- Latest firmware: Full support for modern certificate standards
Certificate Format Requirements
- CA Certificate: PEM or DER format
- Device Certificate: PKCS#12 (.p12/.pfx) with PBE-SHA1-3DES encryption
- Key Size: 2048-bit minimum (4096-bit may not be supported)
- Signature: SHA-256 recommended, SHA-1 for legacy only
System Compatibility Features
The system automatically:- Uses PBE-SHA1-3DES encryption for PKCS#12 export (required for Cambium)
- Includes full certificate chain in PKCS#12 file
- Generates Cambium-compliant certificates when using Cambium template
- Sets Organization to “Cambium” for compatibility
Best Practices
- Use Cambium-Compliant Templates: Ensures compatibility with all PMP450 firmware versions
- Document Passwords: Keep PKCS#12 passwords secure but accessible
- Monitor Expiration: Set up alerts for certificate expiration
- Test First: Test certificate upload on one device before deploying to all
- Backup Certificates: Keep backups of CA and device certificates
- Version Control: Document firmware versions and certificate requirements
Related Documentation
- RADIUS Certificate Integrations - System integration details
- Cambium PMP450 User Guide - Device-specific documentation
- FreeRADIUS Documentation - Server configuration
Support
For issues with:- System certificate generation: Check RADIUS Certificate settings
- Device configuration: Consult Cambium PMP450 documentation
- RADIUS authentication: Review FreeRADIUS server logs
