Cisco Systems OL-16066-01 Network Router User Manual


 
Appendix K Router Platform User Interface Reference
HTTP Policy Page
K-112
User Guide for Cisco Security Manager 3.2
OL-16066-01
HTTP Page—AAA Tab
Use the AAA tab of the HTTP page to define the authentication and authorization
methods to perform on users who attempt to access the router using HTTP or
HTTPS.
Navigation Path
Go to the HTTP Policy Page, page K-110, then click the AAA tab.
Enable SSL When selected, a secure HTTP server (HTTP over SSL or HTTPS) is enabled
on the router.
When deselected, HTTPS is disabled. This is the default for devices that
were not discovered.
Note If SSL is disabled (or if the HTTP policy as a whole is unassigned),
Security Manager cannot communicate with the device after
deployment unless you change the transport protocol for this device
to SSH. This setting can be found in Device Properties.
Note We recommend that you disable HTTP when SSL is enabled. This is
required to ensure only secure connections to the server.
SSL Port The port number to use for HTTPS. Valid values are 443 or any value from
1025 to 65535. The default is 443.
Allow Connection From The numbered ACL that restricts use of HTTP and HTTPS on this device.
Enter the name of an ACL object, or click Select to display an Object
Selectors, page F-593.
If the standard ACL you want is not listed, click the Create button in the
selector to display the Add and Edit Standard Access List Pages, page F-42.
From here you can create an ACL object.
Note If you define an ACL, make sure that it includes the Security
Manager server. Otherwise, Security Manager cannot communicate
with this device using SSL.
Save button Saves your changes to the Security Manager server but keeps them private.
Note To publish your changes, click the Submit button on the toolbar.
Table K-49 HTTP Page—Setup Tab (Continued)