Chapter 7
| Authentication Commands
Web Server
– 187 –
Command Usage
◆
HTTP and HTTPS are implemented as mutually exclusive services on the switch.
◆
If you enable HTTPS, you must indicate this in the URL that you specify in your
browser:
https
://
device
[:
port_number
]
◆
When you start HTTPS, the connection is established in this way:
■
The client authenticates the server using the server’s digital certificate.
■
The client and server negotiate a set of security protocols to use for the
connection.
■
The client and server generate session keys for encrypting and decrypting
data.
◆
The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer 6, Mozilla
Firefox 4, or Google Chrome 29, or more recent versions.
The following web browsers and operating systems currently support HTTPS:
◆
To specify a secure-site certificate, see “Replacing the Default Secure-site
Certificate” in the
System Reference Guide
. Also refer to the
copy
tftp https-
certificate
command.
◆
Connection to the web interface is not supported for HTTPS using an IPv6 link
local address.
Example
Console(config)#ip http secure-server
Console(config)#
Related Commands
ip http secure-port (186)
copy tftp https-certificate
(
92
)
show system (86)
Table 39: HTTPS System Support
Web Browser
Operating System
Internet Explorer 6.x or later
Windows 98,Windows NT (with service pack 6a), Windows
2000, XP, Vista, 7, 8
Mozilla Firefox 4 or later
Windows 2000, XP, Vista, 7, 8, Linux
Google Chrome 29 or later
Windows XP, Vista, 7, 8
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...