Asante Technologies 40240/40480-10G Switch User Manual


 
You can configure the switch to enable the Secure Hypertext Transfer Protocol
(HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an
encrypted connection) to the switch’s web interface.
Command Usage
Both the HTTP and HTTPS service can be enabled independently on the switch.
However, you cannot configure both services to use the same UDP port.
If you enable HTTPS, you must indicate this in the URL that you specify in your
browser: https://device[:port_number]
When you start HTTPS, the connection is established in this way:
- The client authenticates the server using the server’s digital certificate.
- The client and server negotiate a set of security protocols to use for the
connection.
- The client and server generate session keys for encrypting and decrypting data.
The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer 5.x or above
and Netscape 6.2 or above.
6-5
Configuring HTTPS
Console#show radius-server
Remote RADIUS server configuration:
Global settings:
Communication key with RADIUS server: *****
Server port number: 181
Retransmit times: 5
Request timeout: 10
Server 1:
Server IP address: 192.168.1.25
Communication key with RADIUS server: *****
Server port number: 181
Retransmit times: 5
Request timeout: 10
Console#config
Console(config)#authentication login tacacs
Console(config)#tacacs-server host 10.20.30.40
Console(config)#tacacs-server port 200
Console(config)#tacacs-server key green
Console(config)#exit
Console#show tacacs-server
Server IP address: 10.20.30.40
Communication key with tacacs server: *****
Server port number: 200
Console(config)#
Configuring HTTPS
6
25-8
25-4
25-9
25-10
25-10
2
5
-
1
1