• When you start HTTPS, the connection is established in this way:
-
The client authenticates the server using the server’s digital certificate.
- The client and server negotiate a set of security protocols to use for the
connection.
-
The client and server generate session keys for encrypting and decrypting
data.
• The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer 5.x or
above, Netscape 6.2 or above, and Mozilla Firefox 2.0.0.0 or above.
• The following web browsers and operating systems currently support HTTPS:
Table 25-8 HTTPS System Support
Web Browser
Operating System
Internet Explorer 5.0 or later
Windows 98,Windows NT (with service pack 6a),
Windows 2000, Windows XP
Netscape 6.2 or later
Windows 98,Windows NT (with service pack 6a),
Windows 2000, Windows XP, Solaris 2.6
Mozilla Firefox 2.0.0.0 or later
Windows 2000, Windows XP, Linux
•
To specify a secure-site certificate, see “Replacing the Default Secure-site
Certificate” on page 6-7. Also refer to the
copy
command on page 23-11.
Example
Console(config)#ip http secure-server
Console(config)#
Related Commands
ip http secure-port (25-13)
copy tftp https-certificate (23-11)
ip http secure-port
This command specifies the UDP port number used for HTTPS connection to the
switch’s web interface. Use the
no
form to restore the default port.
Syntax
ip http secure-port port_number
no ip http secure-port
port_number
– The UDP port used for HTTPS. (Range: 1-65535)
Default Setting
443
Command Mode
Global Configuration
Command Usage
• You cannot configure the HTTP and HTTPS servers to use the same port.
25-13
Web Server Commands
25
Summary of Contents for IC40240-10G
Page 1: ...IntraCore 40240 40480 10G Layer 3 Gigabit Stackable Ethernet Switch User s Manual ...
Page 4: ...IC40240 10G 99 00837 IC40480 10G 99 00836 ...
Page 6: ...ii ...
Page 33: ...Getting Started ...
Page 43: ...1 1 10 Introduction ...
Page 61: ...2 2 18 Initial Configuration ...
Page 63: ...Switch Management ...
Page 75: ...3 3 12 Configuring the Switch ...
Page 117: ...4 4 42 Basic Management Tasks ...
Page 163: ...6 6 28 User Authentication ...
Page 175: ...7 7 12 Access Control Lists ...
Page 283: ...14 14 8 Quality of Service ...
Page 293: ...15 15 10 Multicast Filtering ...
Page 299: ...16 16 6 Domain Name Service ...
Page 309: ...17 17 10 Dynamic Host Configuration Protocol ...
Page 319: ...18 18 10 Configuring Router Redundancy ...
Page 343: ...19 19 24 IP Routing ...
Page 355: ...Web Click Routing Protocol RIP Statistics Figure 20 5 RIP Statistics 20 12 Unicast Routing 20 ...
Page 385: ...20 20 42 Unicast Routing ...
Page 387: ...Command Line Interface ...
Page 399: ...21 21 12 Overview of the Command Line Interface ...
Page 465: ...24 24 16 SNMP Commands ...
Page 519: ...26 26 18 Access Control List Commands ...
Page 545: ...30 30 2 Rate Limit Commands ...
Page 611: ...34 34 24 VLAN Commands ...
Page 625: ...35 35 14 Class of Service Commands ...
Page 633: ...36 7 police 36 ...
Page 670: ...39 39 16 DHCP Commands ...
Page 716: ...41 41 36 IP Interface Commands ...
Page 768: ...42 42 52 IP Routing Commands ...
Page 770: ...Appendices ...
Page 791: ......
Page 792: ...IC40240 10G IC40480 10G ...