Purpose
Command or Action
Authenticates the CA by getting the public key of the CA. Use the
same name used in Step 5.
crypto ca authentication name
Example:
Switch(config)#
crypto ca authentication
Step 11
your_trustpoint
Obtains the certificate from the specified CA trustpoint. This
command requests a signed certificate for each RSA key pair.
crypto ca enroll name
Example:
Switch(config)#
crypto ca enroll
your_trustpoint
Step 12
Returns to privileged EXEC mode.
end
Example:
Switch(config)#
end
Step 13
Configuring the Secure HTTP Server
Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP server:
Before You Begin
If you are using a certificate authority for certification, you should use the previous procedure to configure
the CA trustpoint on the switch before enabling the HTTP server. If you have not configured a CA trustpoint,
a self-signed certificate is generated the first time that you enable the secure HTTP server. After you have
configured the server, you can configure options (path, access list to apply, maximum number of connections,
or timeout policy) that apply to both standard and secure HTTP servers.
To verify the secure HTTP connection by using a Web browser, enter https://
URL
, where the URL is the IP
address or hostname of the server switch. If you configure a port other than the default port, you must also
specify the port number after the URL. For example:
AES256_SHA2 is not supported.
Note
https://209.165.129:1026
or
https://host.domain.com:1026
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
131
Configuring Secure Socket Layer HTTP
Configuring the Secure HTTP Server