S
YSTEM
M
ANAGEMENT
C
OMMANDS
4-41
• When you start HTTPS, the connection is established in this way:
- The client authenticates the server using the server’s digital
certificate.
- The client and server negotiate a set of security protocols to use for
the connection.
- The client and server generate session keys for encrypting and
decrypting data.
• The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer
5.x and Netscape Navigator 4.x or later versions.
• The following web browsers and operating systems currently support
HTTPS:
• To specify a secure-site certificate, see “Replacing the Default
Secure-site Certificate” on page 3-49. Also refer to the
copy
command
on page 4-83.
Example
Related Commands
ip http secure-port (4-41)
copy tftp https-certificate (4-83)
ip http secure-port
This command specifies the UDP port number used for HTTPS/SSL
connection to the switch’s web interface. Use the
no
form to restore the
default port.
Table 4-13 HTTPS System Support
Web Browser
Operating System
Internet Explorer 5.0 or later
Windows 98,Windows NT (with service
pack 6a), Windows 2000, Windows XP
Netscape Navigator 4.76 or later Windows 98,Windows NT (with service
pack 6a), Windows 2000, Windows XP,
Solaris 2.6
Console(config)#ip http secure-server
Console(config)#
Summary of Contents for TigerSwitch 1000
Page 2: ......
Page 19: ...CONTENTS xv...
Page 23: ...TABLES xix...
Page 36: ...INTRODUCTION 1 10...
Page 155: ...PORT CONFIGURATION 3 107 Figure 3 50 Displaying Etherlike and RMON Statistics...
Page 222: ...CONFIGURING THE SWITCH 3 174...
Page 417: ...VLAN COMMANDS 4 195 This section describes commands used to configure private VLANs...
Page 466: ...TROUBLESHOOTING B 4...
Page 479: ......