this is my certs and keys
Code: Select all
admin@MikroTik] /file> print
# NAME TYPE SIZE CREATION-TIME
0 skins directory jan/01/1970 03:00:05
1 pub directory jan/01/2002 05:11:47
2 gw.comp.com.key .key file 3243 aug/09/2017 23:58:30
3 city.crt .crt file 1927 aug/09/2017 23:58:30
4 city.key .key file 3243 aug/09/2017 23:58:30
5 gw.comp.com.crt .crt file 1919 aug/09/2017 23:58:30
Code: Select all
[tirey@MikroTik] /certificate> print
Flags: K - private-key, D - dsa, L - crl, C - smart-card-key, A - authority, I - issued, R - revoked, E - expired, T - trusted
# NAME COMMON-NAME SUBJECT-ALT-NAME
[admin@MikroTik] /certificate>
Code: Select all
[admin@MikroTik] /certificate> import file-name=city.crt
passphrase:
certificates-imported: 1
private-keys-imported: 0
files-imported: 1
decryption-failures: 0
keys-with-no-certificate: 0
[admin@MikroTik] /certificate> import file-name=city.key
passphrase:
certificates-imported: 0
private-keys-imported: 1
files-imported: 1
decryption-failures: 0
keys-with-no-certificate: 0
[admin@MikroTik] /certificate> print
Flags: K - private-key, D - dsa, L - crl, C - smart-card-key, A - authority, I - issued, R - revoked, E - expired, T - trusted
# NAME COMMON-NAME SUBJECT-ALT-NAME
0 K T city.crt_0 mycity.company.net
[admin@MikroTik] /certificate>
Then import the second cert
Code: Select all
[admin@MikroTik] /certificate> import file-name=gw.comp.com.crt
passphrase:
certificates-imported: 1
private-keys-imported: 0
files-imported: 1
decryption-failures: 0
keys-with-no-certificate: 0
[admin@MikroTik] /certificate> print
Flags: K - private-key, D - dsa, L - crl, C - smart-card-key, A - authority, I - issued, R - revoked, E - expired, T - trusted
# NAME COMMON-NAME SUBJECT-ALT-NAME
0 T city.crt_0 gw.company.com
[admin@MikroTik] /certificate>