Generating Certificates - Cisco Network Analysis Module 6000 Installation And Configuration Manual

Cisco systems network analysis module installation and configuration guide
Hide thumbs Also See for Network Analysis Module 6000:
Table of Contents

Advertisement

Configuring the NAM
After applying the patch, the ip http secure commands are enabled, and the following messages are
Step 2
displayed:
Configure the HTTP port by entering this command:
Step 3
root@localhost# ip http secure port 8080
The HTTP server is enabled now. You must restart the
server to change HTTP port. Continue [y/n]? y
The port number range is from 1 to 65535.
Note
Step 4
Enable the HTTP server by entering this command:
root@localhost# ip http server enable
Enabling HTTP server...
No web users configured!
Please enter a web administrator username [admin]:admin
New password:
Confirm password
User admin added.
Successfully enabled HTTP server.

Generating Certificates

Certificates are used to validate the secure server connection. You can generate a self-signed certificate
or obtain and install a certificate from a certification authority.
Generate a self-signed certificate by entering this command:
Console> (enable)# ip http secure generate self-signed-certificate
A certificate-signing request already exists. Generating a
new self signed certificate will invalidate the existing
signing request and any certificates already generated from
the existing request.
certificate-signing request or n to generate a new one.
Reuse existing certificate-signing request?[y/n] y
The HTTP server is enabled now. You must restart
to generate the certificate. Continue [y/n]? y
-----BEGIN CERTIFICATE-----
MIIDAzCCAmygAwIBAgIBADANBgkqhkiG9w0BAQQFADBlMQswCQYDVQQGEwJBVTET
Catalyst 6000 Family Network Analysis Module Installation and Configuration Note
34
1931 bytes transferred in 0.02 sec (107.96k/sec)
Verifying cisco-nam-strong-crypto-patchK9-1.0-1.i386.rpm. Please wait...
Package cisco-nam-strong-crypto-patchK9-1.0-1.i386.rpm verified.
Applying /usr/local/nam/patch/workdir/cisco-nam-strong-crypto-patchK9-1.0-1.i386
.rpm. Please wait...
########################################### [100%]
########################################### [100%]
Patch update completed successfully.
Console> # ip http secure port 1777
Successfully changed HTTP secure port to 1777.
Web root and guest user names are different from the CLI root and guest users.
Enter y to reuse the existing
78-10406-05

Advertisement

Table of Contents
loading

Table of Contents