hit counter script

Configuring The Secure Http Server - Cisco Catalyst 2960-X Security Configuration Manual

Cisco ios release 15.0(2)ex
Hide thumbs Also See for Catalyst 2960-X:
Table of Contents

Advertisement

Configuring Secure Socket Layer HTTP
Command or Action
Step 11
crypto ca authentication name
Example:
Switch(config)# crypto ca authentication
your_trustpoint
Step 12
crypto ca enroll name
Example:
Switch(config)# crypto ca enroll
your_trustpoint
Step 13
end
Example:
Switch(config)# end

Configuring the Secure HTTP Server

Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP server:
Before You Begin
If you are using a certificate authority for certification, you should use the previous procedure to configure
the CA trustpoint on the switch before enabling the HTTP server. If you have not configured a CA trustpoint,
a self-signed certificate is generated the first time that you enable the secure HTTP server. After you have
configured the server, you can configure options (path, access list to apply, maximum number of connections,
or timeout policy) that apply to both standard and secure HTTP servers.
To verify the secure HTTP connection by using a Web browser, enter https://URL, where the URL is the IP
address or hostname of the server switch. If you configure a port other than the default port, you must also
specify the port number after the URL. For example:
Note
AES256_SHA2 is not supported.
https://209.165.129:1026
or
https://host.domain.com:1026
OL-29048-01
Purpose
Authenticates the CA by getting the public key of the CA. Use the
same name used in Step 5.
Obtains the certificate from the specified CA trustpoint. This
command requests a signed certificate for each RSA key pair.
Returns to privileged EXEC mode.
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
Configuring the Secure HTTP Server
131

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents