When a user logs on to the WAP's configuration utility, a session is created. This session is maintained until the
user logs off or the session timeout expires. The range is from 1 to 10 sessions. The default is 5. If the maximum
number of sessions are reached, the next user who attempts to log on to the configuration utility receives an error
message about the session limit.
•
Session Timeout
—
Enter the maximum amount of time, in minutes, that an inactive user remains logged on. When
the configured timeout is reached, the user is automatically logged off. The range is from 2 to 60 minutes. The
default is 10 minutes.
Step 3
Configure the HTTP and HTTPS services:
•
HTTP Service
—
Enable or disable access through HTTP. By default, HTTP access is disabled. If you disable it,
any current connections using that protocol are disconnected.
◦
HTTP Port
—
Enter the logical port number to use for the HTTP connections, from 1025 to 65535. The
default port number for the HTTP connections is the well-known IANA port number 80.
◦
Redirect HTTP to HTTPS
—
Redirects management HTTP access attempts on the HTTP port to the HTTPS
port. This field is available only when HTTP access is disabled.
•
HTTPS Service
—
Enable or disable access through secure HTTP (HTTPS). By default, HTTPS access is enabled.
If you disable it, any current connections using that protocol are disconnected.
◦
HTTPS Port
—
Enter the logical port number to use for the HTTPS connections, from 1025 to 65535. The
default port number for the HTTPS connections is the IANA port number 443.
•
Management ACL Mode
—
If the Mode is enabled, access through the web and SNMP is restricted to the specified
IP hosts. If this feature is disabled, anyone can access the configuration utility from any network client by supplying
the correct user name and password of the WAP device.
Verify any IP address that you enter. If you enter an IP address that does not match your administrative
computer, you will lose access to the configuration interface. We recommend that you give the administrative
computer a static IP address, so the address does not change over time.
Note
Step 4
Click
Save
.
SSL Certificate File Status
To use the HTTPS services, the WAP device must have a valid SSL certificate. The WAP device can generate
a certificate, or you can download it from your network or from a TFTP server.
In the Generate SSL Certificate area, click
SSL Settings
, then click
Generate
to generate the certificate for
the WAP device. This procedure should be done after the WAP device has acquired an IP address to ensure
that the common name for the certificate matches the IP address of the WAP device. Generating a new SSL
certificate restarts the secure web server. The secure connection does not work until the new certificate is
accepted on the browser.
In the SSL Certificate File Status area, you can view the current certificate on the WAP device. The following
will be displayed:
Cisco WAP125 Wireless-AC/N Dual Band Desktop Access Point with PoE
24
System Configuration
SSL Certificate File Status