Authentication Commands
4-135
4
• When you start HTTPS, the connection is established in this way:
- The client authenticates the server using the server’s digital certificate.
- The client and server negotiate a set of security protocols to use for the
connection.
- The client and server generate session keys for encrypting and decrypting
data.
• The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer 5.x or
above, Netscape 6.2 or above, and Mozilla Firefox 2.0.0.0 or above.
• The following web browsers and operating systems currently support HTTPS:
• To specify a secure-site certificate, see “Replacing the Default Secure-site
Certificate” on page 3-89. Also refer to the
copy
command on page 4-37.
Example
Related Commands
ip http secure-port (4-135)
copy tftp https-certificate (4-37)
ip http secure-port
This command specifies the UDP port number used for HTTPS connection to the
switch’s web interface. Use the
no
form to restore the default port.
Syntax
ip http secure-port
port_number
no ip http secure-port
port_number
– The UDP port used for HTTPS.
(Range: 1-65535)
Default Setting
443
Command Mode
Global Configuration
Table 4-35 HTTPS System Support
Web Browser
Operating System
Internet Explorer 5.0 or later
Windows 98,Windows NT (with service pack 6a),
Windows 2000, Windows XP
Netscape 6.2 or later
Windows 98,Windows NT (with service pack 6a),
Windows 2000, Windows XP, Solaris 2.6
Mozilla Firefox 2.0.0.0 or later
Windows 2000, Windows XP, Linux
Console(config)#ip http secure-server
Console(config)#
Summary of Contents for 6152PL2 FICHE
Page 2: ......
Page 6: ...vi ...
Page 8: ...viii ...
Page 32: ...Tables xxxii ...
Page 38: ...Figures xxxviii ...
Page 56: ...Initial Configuration 2 10 2 ...
Page 378: ...Configuring the Switch 3 322 3 ...
Page 817: ......