How to Configure Secure HTTP Servers and Clients
Configuring a CA Trustpoint
For secure HTTP connections, we recommend that you configure an official CA trustpoint. A CA trustpoint
is more secure than a self-signed certificate.
Beginning in privileged EXEC mode, follow these steps to configure a CA Trustpoint:
SUMMARY STEPS
1.
configure terminal
2.
hostname hostname
3.
ip domain-name domain-name
4.
crypto key generate rsa
5.
crypto ca trustpoint name
6.
enrollment url url
7.
enrollment http-proxy host-name port-number
8.
crl query url
9.
primary name
10.
exit
11.
crypto ca authentication name
12.
crypto ca enroll name
13.
end
DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
Specifies the hostname of the switch (required only if you have
not previously configured a hostname). The hostname is required
for security keys and certificates.
hostname hostname
Example:
Switch(config)#
hostname your_hostname
Step 2
Specifies the IP domain name of the switch (required only if you
have not previously configured an IP domain name). The domain
name is required for security keys and certificates.
ip domain-name domain-name
Example:
Switch(config)#
ip domain-name your_domain
Step 3
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
129
Configuring Secure Socket Layer HTTP
How to Configure Secure HTTP Servers and Clients