Chapter 4
Using the Configuration Manager
Example: Setting up a Reverse-Proxy Server
78-13124-05
When using FIPS Mode only default security policies
Note
and those configured for FIPS 140-2-compliant
operation are available.
Exit to Privileged mode, and save the configuration to flash memory. If it is
6.
not saved, the configuration is lost during a power cycle or when the reload
command is used.
(config-ssl-backend[myBackServ])# finished
SCA# write flash
SCA#
This example describes how to use the configuration manager to set up a
reverse-proxy server.
1.
Enter Privileged, Configuration, and SSL Configuration modes.
SCA> enable
SCA# configure
(config[myDevice])# ssl
(config-ssl[myDevice])#
Enter Reverse-Proxy Server Configuration mode and create a server named
2.
myRevServ.
(config-ssl[myDevice])# reverse-proxy-server myRevServ create
(config-ssl-rproxy[myRevServ])#
Assign port 8080 for clear text traffic.
3.
(config-ssl-rproxy[myRevServ])# localport 8080
4.
Specify a security policy for the server.
(config-ssl-rproxy[myRevServ])# secpolicy strong
When using FIPS Mode only security policies
Note
configured for FIPS 140-2-compliant operation are
available.
Cisco 11000 Series Secure Content Accelerator Configuration Guide
Configuring the Device
4-11