HP 5830 Series Configuration Manual page 55

Hide thumbs Also See for 5830 Series:
Table of Contents

Advertisement

Step
3.
Associate the HTTPS
service with an SSL server
policy.
4.
Enable the HTTPS service.
5.
Associate the HTTPS
service with a certificate
attribute-based access
control policy.
Command
ip https ssl-server-policy
policy-name
ip https enable
ip https certificate
access-control-policy
policy-name
48
Remarks
Optional.
By default, the HTTPS service is not
associated with any SSL server policy,
and the device uses a self-signed
certificate for authentication.
If you disable the HTTPS service, the
system automatically de-associates the
HTTPS service from the SSL service
policy. Before re-enabling the HTTPS
service, associate the HTTPS service with
an SSL server policy first.
If the HTTPS service has been enabled,
any changes to the SSL server policy
associated with the HTTP service that is
enabled do not take effect.
By default, HTTPS is disabled.
Enabling the HTTPS service triggers an
SSL handshake negotiation process.
During the process, if the local certificate
of the device exists, the SSL negotiation
succeeds, and the HTTPS service can be
started correctly. If no local certificate
exists, a certificate application process
will be triggered by the SSL negotiation.
Because the application process takes
much time, the SSL negotiation often fails
and the HTTPS service cannot be started
correctly. In that case, execute the ip
https enable command multiple times to
start the HTTPS service.
Optional.
By default, the HTTPS service is not
associated with any certificate-based
attribute access control policy.
Associating the HTTPS service with a
certificate-based attribute access control
policy enables the device to control the
access rights of clients.
You must configure the client-verify
enable command in the associated SSL
server policy. If not, no clients can log in
to the device.
The associated SSL server policy must
contain at least one permit rule.
Otherwise, no clients can log in to the
device.
For more information about certificate
attribute-based access control policies,
see Security Configuration Guide.

Advertisement

Table of Contents
loading

Table of Contents