Configuring The Secure Http Server - Cisco Catalyst 2960-XR Security Configuration Manual

Ios release 15.0 2 ex1
Hide thumbs Also See for Catalyst 2960-XR:
Table of Contents

Advertisement

Configuring Secure Socket Layer HTTP
Command or Action
Step 12
crypto ca enroll name
Example:
Switch(config)# crypto ca enroll
your_trustpoint
Step 13
end
Example:
Switch(config)# end

Configuring the Secure HTTP Server

Beginning in privileged EXEC mode, follow these steps to configure a secure HTTP server:
Before You Begin
If you are using a certificate authority for certification, you should use the previous procedure to configure
the CA trustpoint on the switch before enabling the HTTP server. If you have not configured a CA trustpoint,
a self-signed certificate is generated the first time that you enable the secure HTTP server. After you have
configured the server, you can configure options (path, access list to apply, maximum number of connections,
or timeout policy) that apply to both standard and secure HTTP servers.
To verify the secure HTTP connection by using a Web browser, enter https://URL, where the URL is the IP
address or hostname of the server switch. If you configure a port other than the default port, you must also
specify the port number after the URL. For example:
https://209.165.129:1026
or
https://host.domain.com:1026
OL-29434-01
Purpose
Obtains the certificate from the specified CA trustpoint. This
command requests a signed certificate for each RSA key pair.
Returns to privileged EXEC mode.
Catalyst 2960-XR Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX1
Configuring the Secure HTTP Server
99

Advertisement

Table of Contents
loading

Table of Contents