7-42
Cisco Catalyst Blade Switch 3120 for HP Software Configuration Guide
OL-12247-01
Chapter 7 Configuring Switch-Based Authentication
Configuring the Switch for Secure Socket Layer HTTP
Displaying the SSH Configuration and Status
To display the SSH server configuration and status, use one or more of the privileged EXEC commands
in
Table 7-3
:
For more information about these commands, see the “Secure Shell Commands” section in the “Other
Security Features” chapter of the Cisco IOS Security Command Reference, Cisco IOS Release 12.2, at
this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1835/products_command_reference_chapter0918
6a00800ca7d0.html
Configuring the Switch for Secure Socket Layer HTTP
This section describes how to configure Secure Socket Layer (SSL) Version 3.0 support for the
HTTP 1.1 server and client. SSL provides server authentication, encryption, and message integrity, as
well as HTTP client authentication, to allow secure HTTP communications.To use this feature, the
cryptographic (encrypted) software image must be installed on your switch. You can download the
cryptographic software image from
www.hp.com/support.
For more information about the cryptographic
image, see the release notes for this release.
These sections contain this information:
•
Understanding Secure HTTP Servers and Clients, page 7-42
•
Configuring Secure HTTP Servers and Clients, page 7-45
•
Displaying Secure HTTP Server and Client Status, page 7-49
For configuration examples and complete syntax and usage information for the commands used in this
section, see the “HTTPS - HTTP Server and Client with SSL 3.0” feature description for Cisco IOS
Release 12.2(15)T at this URL:
http://www.cisco.com/en/US/products/sw/iosswrel/ps1839/products_feature_guide09186a008015a4c6.
html
Understanding Secure HTTP Servers and Clients
On a secure HTTP connection, data to and from an HTTP server is encrypted before being sent over the
Internet. HTTP with SSL encryption provides a secure connection to allow such functions as configuring
a switch from a Web browser. Cisco's implementation of the secure HTTP server and secure HTTP client
uses an implementation of SSL Version 3.0 with application-layer encryption. HTTP over SSL is
abbreviated as HTTPS; the URL of a secure connection begins with https:// instead of http://.
Table 7-3
Commands for Displaying the SSH Server Configuration and Status
Command
Purpose
show ip ssh
Shows the version and configuration information for the SSH server.
show ssh
Shows the status of the SSH server.