DETAILED STEPS
Purpose
Command or Action
Enters the global configuration mode.
configure terminal
Example:
Switch#
configure terminal
Step 1
(Optional) Specifies the CA trustpoint to be used if the remote HTTP
server requests client authentication. Using this command assumes
ip http client secure-trustpoint name
Example:
Switch(config)#
ip http client
Step 2
that you have already configured a CA trustpoint by using the
previous procedure. The command is optional if client authentication
is not needed or if a primary trustpoint has been configured.
secure-trustpoint your_trustpoint
(Optional) Specifies the CipherSuites (encryption algorithms) to be
used for encryption over the HTTPS connection. If you do not have
ip http client secure-ciphersuite
{[
3des-ede-cbc-sha
] [
rc4-128-md5
]
[
rc4-128-sha
] [
des-cbc-sha
]}
Step 3
a reason to specify a particular CipherSuite, you should allow the
server and client to negotiate a CipherSuite that they both support.
This is the default.
Example:
Switch(config)#
ip http client
secure-ciphersuite rc4-128-md5
Returns to privileged EXEC mode.
end
Example:
Switch(config)#
end
Step 4
Monitoring Secure HTTP Server and Client Status
To monitor the SSL secure server and client status, use the privileged EXEC commands in the following table.
Table 16: Commands for Displaying the SSL Secure Server and Client Status
Purpose
Command
Shows the HTTP secure client configuration.
show ip http client secure status
Shows the HTTP secure server configuration.
show ip http server secure status
Shows the generated self-signed certificate for secure
HTTP connections.
show running-config
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
OL-29048-01
135
Configuring Secure Socket Layer HTTP
Monitoring Secure HTTP Server and Client Status