Chapter 79: Secure HTTPS Web Browser Server
1160
Section XI: Management Security
Overview
The switch has a web browser server for remote management of the unit
with a web browser application from management workstations on your
network. The server has a secure HTTPS mode and a non-secure HTTP
mode. Web browser management sessions that use the secure HTTPS
mode are protected against snooping because the packets exchanged
between the switch and your management workstations are encrypted.
Only the switch and the workstations are able to decipher the packets.
In contrast, web browser management sessions conducted in the non-
secure HTTP mode are vulnerable to eavesdropping because the packets
are sent in clear text.
This chapter explains how to configure the switch for the secure HTTPS
mode. For directions on the non-secure mode, refer to Chapter 77, “Non-
secure HTTP Web Browser Server” on page 1147.
Certificates
When you initiate an HTTPS connection from your management
workstation to the switch, the switch responds by sending a certificate to
your workstation. This file contains the encryption key that the two devices
use to encrypt and decrypt their packets to each other. Also included in
the certificate is a distinguished name that identifies the owner of the
certificate, which in the case of a certificate for your switch, is the switch
itself and your company.
The switch does not come with a certificate. You have to create it, along
with the encryption key and distinguished name, as part of the HTTPS
configuration process.
There are two ways to create the certificate. The quickest and easiest way
is to have the switch create it itself. This type of certificate is called a self-
signed certificate because the switch authenticates the certificate itself.
Another option is to create the encryption key and have someone else
issue the certificate. That person, group, or organization is called a
certification authority (CA), of which there are public and private CAs. A
public CA issues certificates typically intended for use by the general
public, for other companies or organizations. Public CAs require proof of
the identify of the company or organization before they will issue a
certificate. VeriSign is an example of a public CA.
Because the certificate for the switch is not intended for general use and
will only be used by you and other network managers to manage the
device, having a public CA issue the certificate will probably be
unnecessary.
Some large companies have private CAs. This is a person or group that is
responsible for issuing certificates for the company’s network equipment.
Содержание AT-9000/28
Страница 4: ......
Страница 26: ...Contents 26...
Страница 30: ...Tables 30...
Страница 36: ...36 Section I Getting Started...
Страница 70: ...Chapter 2 Starting a Management Session 70 Section I Getting Started...
Страница 96: ...96 Section II Basic Operations...
Страница 142: ...Chapter 6 Basic Switch Management Commands 142 Section II Basic Operations...
Страница 220: ...Chapter 9 IPv4 and IPv6 Management Addresses 220 Section II Basic Operations...
Страница 244: ...Chapter 10 IPv4 and IPv6 Management Address Commands 244 Section II Basic Operations...
Страница 264: ...Chapter 12 SNTP Client Commands 264 Section II Basic Operations...
Страница 298: ...Chapter 15 Enhanced Stacking 298 Section II Basic Operations...
Страница 312: ...Chapter 16 Enhanced Stacking Commands 312 Section II Basic Operations...
Страница 318: ...Chapter 17 Port Mirror 318 Section II Basic Operations...
Страница 324: ...Chapter 18 Port Mirror Commands 324 Section II Basic Operations Example awplus show mirror...
Страница 350: ...Chapter 21 Multicast Commands 350 Section II Basic Operations...
Страница 352: ...352 Section III File System...
Страница 360: ...Chapter 22 File System 360 Section III File System...
Страница 383: ...AT 9000 Switch Command Line User s Guide Section III File System 383 Example awplus show boot...
Страница 386: ...Chapter 25 Boot Configuration File Commands 386 Section III File System...
Страница 398: ...Chapter 26 File Transfers 398 Section III File System...
Страница 406: ...Chapter 27 File Transfer Commands 406 Section III File System...
Страница 408: ...408 Section IV Event Messages...
Страница 430: ...Chapter 30 Syslog Client 430 Section IV Event Messages...
Страница 438: ...438 Section V Port Trunks...
Страница 448: ...Chapter 32 Static Port Trunks 448 Section V Port Trunks...
Страница 480: ...480 Section VI Spanning Tree Protocols...
Страница 500: ...Chapter 36 Spanning Tree and Rapid Spanning Tree Protocols 500 Section VI Spanning Tree Protocols...
Страница 520: ...Chapter 38 STP Commands 520 Section VI Spanning Tree Protocols...
Страница 542: ...Chapter 40 RSTP Commands 542 Section VI Spanning Tree Protocols Example awplus show spanning tree...
Страница 558: ...558 Section VII Virtual LANs...
Страница 600: ...Chapter 42 Port based and Tagged VLAN Commands 600 Section VII Virtual LANs...
Страница 634: ...Chapter 44 GARP VLAN Registration Protocol Commands 634 Section VII Virtual LANs...
Страница 670: ...Chapter 47 Private Port VLANs 670 Section VII Virtual LANs...
Страница 692: ...Chapter 50 VLAN Stacking 692 Section VII Virtual LANs...
Страница 698: ...Chapter 51 VLAN Stacking Commands 698 Section VII Virtual LANs...
Страница 700: ...700 Section VIII Port Security...
Страница 748: ...Chapter 54 802 1x Port based Network Access Control 748 Section VIII Port Security...
Страница 790: ...Chapter 55 802 1x Port based Network Access Control Commands 790 Section VIII Port Security...
Страница 792: ...792 Section IX Simple Network Management Protocols...
Страница 804: ...Chapter 56 SNMPv1 and SNMPv2c 804 Section X Simple Network Management Protocols...
Страница 852: ...852 Section X Network Management...
Страница 976: ...Chapter 63 Address Resolution Protocol ARP 976 Section X Network Management...
Страница 1090: ...1090 Section XI Management Security...
Страница 1114: ...Chapter 71 Telnet Server 1114 Section XI Management Security...
Страница 1122: ...Chapter 73 Telnet Client 1122 Section XI Management Security...
Страница 1126: ...Chapter 74 Telnet Client Commands 1126 Section XI Management Security...
Страница 1138: ...Chapter 75 Secure Shell SSH Server 1138 Section XI Management Security...
Страница 1158: ...Chapter 78 Non secure HTTP Web Browser Server Commands 1158 Section XI Management Security...
Страница 1186: ...Chapter 80 Secure HTTPS Web Browser Server Commands 1186 Section XI Management Security...
Страница 1202: ...Chapter 81 RADIUS and TACACS Clients 1202 Section XI Management Security...
Страница 1230: ...Chapter 82 RADIUS and TACACS Client Commands 1230 Section XI Management Security...
Страница 1244: ...Chapter System Monitoring Commands 1244...
Страница 1278: ...Index 1278 Configuration mode 644 659 VLAN SET MACADDRESS command Port Interface mode 644 661 W WRITE command 75 94 385...