SSL certificate chain in RUT devices


In order to use a custom trusted CA issued certificate for HTTPS in RUT devices, in which order should the certificates be in to get a complete and trusted chain (if supported by RouterOS)?
Just adding a single x509 certificate with private key makes most browsers and certificate verifications fail, since the complete chain of issuers is missing.
For most *nix based devices, the order of certificates in the chain should be: Certificate, Intermediate(s), CA - would this also work for RUT devices?

This topic was automatically closed after 15 days. New replies are no longer allowed.