DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
(Optional) Specifies the CA trustpoint to be used if the remote HTTP
server requests client authentication. Using this command assumes
ip http client secure-trustpoint name
Example:
Switch(config)#
ip http client
Step 2
that you have already configured a CA trustpoint by using the previous
procedure. The command is optional if client authentication is not
needed or if a primary trustpoint has been configured.
secure-trustpoint your_trustpoint
(Optional) Specifies the CipherSuites (encryption algorithms) to be
used for encryption over the HTTPS connection. If you do not have
ip http client secure-ciphersuite
{[
3des-ede-cbc-sha
] [
rc4-128-md5
]
[
rc4-128-sha
] [
des-cbc-sha
]}
Step 3
a reason to specify a particular CipherSuite, you should allow the
server and client to negotiate a CipherSuite that they both support.
This is the default.
Example:
Switch(config)#
ip http client
secure-ciphersuite rc4-128-md5
Returns to privileged EXEC mode.
end
Example:
Switch(config)#
end
Step 4
How to Configure Secure HTTP Servers and Clients
These sections contain this configuration information:
Monitoring Secure HTTP Server and Client Status
To monitor the SSL secure server and client status, use the privileged EXEC commands in the following table.
Table 13: Commands for Displaying the SSL Secure Server and Client Status
Purpose
Command
Shows the HTTP secure client configuration.
show ip http client secure status
Shows the HTTP secure server configuration.
show ip http server secure status
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
OL-29434-01
103
Configuring Secure Socket Layer HTTP
How to Configure Secure HTTP Servers and Clients