Which certificate / how to use for regular TLS HTTPGET on BC660k-gl

I’m trying to GET a page from our HTTPS webserver. Non SSL, regular HTTP works fine. I’ve exported the root certificate from the server and added it to the communication. The result is a 716 error. Each time.

Am I doing this right? I think the manual lacks in explaining which type of certificate should be added, so I’m experimenting here. I’d would rather know exactly how to go about this.

Here’s the steps and results:

08:42:35.385 >   Open connection to report host URL https://***redacted***
08:42:35.401 >     [rdResp]: AT+QSSLCFG=0,0,"debug",4
08:42:35.409 >     [rdResp]: OK
08:42:35.427 >     [rdResp]: AT+QSSLCFG=0,0,"seclevel",1
08:42:35.435 >     [rdResp]: OK
08:42:35.451 >     [rdResp]: AT+QSSLCFG=0,0,"cacert"
08:42:35.460 >     [rdResp]: >
08:42:35.582 >     [rdResp]: -----BEGIN CERTIFICATE-----
08:42:35.591 >     [rdResp]: MIIDQTCCAimgAwIBAgITBmyfz5m/jAo54vB4ikPmljZbyjANBgkqhkiG9w0BAQsF
08:42:35.600 >     [rdResp]: ADA5MQswCQYDVQQGEwJVUzEPMA0GA1UEChMGQW1hem9uMRkwFwYDVQQDExBBbWF6
08:42:35.609 >     [rdResp]: b24gUm9vdCBDQSAxMB4XDTE1MDUyNjAwMDAwMFoXDTM4MDExNzAwMDAwMFowOTEL
08:42:35.617 >     [rdResp]: MAkGA1UEBhMCVVMxDzANBgNVBAoTBkFtYXpvbjEZMBcGA1UEAxMQQW1hem9uIFJv
08:42:35.626 >     [rdResp]: b3QgQ0EgMTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALJ4gHHKeNXj
08:42:35.635 >     [rdResp]: ca9HgFB0fW7Y14h29Jlo91ghYPl0hAEvrAIthtOgQ3pOsqTQNroBvo3bSMgHFzZM
08:42:35.644 >     [rdResp]: 9O6II8c+6zf1tRn4SWiw3te5djgdYZ6k/oI2peVKVuRF4fn9tBb6dNqcmzU5L/qw
08:42:35.653 >     [rdResp]: IFAGbHrQgLKm+a/sRxmPUDgH3KKHOVj4utWp+UhnMJbulHheb4mjUcAwhmahRWa6
08:42:35.662 >     [rdResp]: VOujw5H5SNz/0egwLX0tdHA114gk957EWW67c4cX8jJGKLhD+rcdqsq08lA4b9v7LWIbxcceVOF34GfID5yHI9Y/QCB/IIDEgEw+OyQm
08:42:35.671 >     [rdResp]: jgSubJrIqg0CAwEAABAf8EBAMC
08:42:35.680 >     [rdResp]: AYYwHQYDVR0OBBYEFIQYzIU07LwMlJQuCFmcx7IQTgoIMA0GCSqGSIbMOruYou6r4lK5IpDB/G/wkjUu0yKGX9rbxenDI
08:42:35.689 >     [rdResp]: U5PMCCjjmCXPI6T53iHTfIUJrUs
08:42:35.698 >     [rdResp]: N+gDS63pYaACbvXy8MWy7Vu33PqUXHeeE6V/Uq2V8viTO96LXFvKWlJbYK8U90vv
boQnoZsG4q5WTP468SQvvG5esp]: o/ufQJVtMVT8QtPHRh8jrdkPSHCa2XV4cdFyQzR1bldZwgJcJmApzyMZFo6IQ6XU
08:42:35.716 >     [rdResp]: -----END CERTIFICATE-----
08:42:35.730 >     [rdResp]: +QSSLCFG: 0,0,"cacert",1208
08:42:35.743 >     [rdResp]: OK
08:42:35.896 >     [rdResp]: +IP: 10.76.106.211
08:42:35.905 >     [rdResp]: AT+QHTTPCFG="ssl",0,0
08:42:35.914 >     [rdResp]: OK
08:42:35.932 >     [rdResp]: AT+QSSLCFG=0,0,"sslversion",4
08:42:35.941 >     [rdResp]: OK
08:42:35.960 >     [rdResp]: AT+QHTTPCFG="responseheader",1
08:42:35.968 >     [rdResp]: OK
08:42:35.994 >     [rdResp]: AT+QSSLCFG=0,0
08:42:36.002 >     [rdResp]: +QSSLCFG: 0,0,"seclevel",1
08:42:36.011 >     [rdResp]: +QSSLCFG: 0,0,"sslversion",4
08:42:36.020 >     [rdResp]: +QSSLCFG: 0,0,"dataformat",0,0
08:42:36.029 >     [rdResp]: +QSSLCFG: 0,0,"timeout",90
08:42:36.038 >     [rdResp]: +QSSLCFG: 0,0,"debug",4
08:42:36.047 >     [rdResp]: +QSSLCFG: 0,0,"cacert",1208
08:42:36.056 >     [rdResp]: +QSSLCFG: 0,0,"clientcert",0
08:42:36.065 >     [rdResp]: +QSSLCFG: 0,0,"clientkey",0
08:42:36.074 >     [rdResp]: +QSSLCFG: 0,0,"dtls",0
08:42:36.083 >     [rdResp]: +QSSLCFG: 0,0,"dtlsversion",2
08:42:36.096 >     [rdResp]: OK
08:42:37.143 >     [rdResp]: AT+QHTTPURL=169
08:42:37.152 >     [rdResp]: >
08:42:37.186 >     [rdResp]: OK
08:42:37.246 >     [rdResp]: AT+QHTTPGET=30
08:42:37.255 >     [rdResp]: OK
08:42:39.922 >     [rdResp]: +QHTTPGET: 716
08:42:39.926 >     Error.. 716

I suggest you provide me with the complete AT log, including the URL

Thanks for your reply. I cannot share the URL. This is the complete AT log.

Do you know which certificate I should use?

Can you add a test URL to me? I need to cross-verify it