ES-2024 Series User’s Guide
Chapter 23 Access Control 158
HTTPS on the switch is used so that you may securely access the switch using the web
configurator. The SSL protocol specifies that the SSL server (the switch) must always
authenticate itself to the SSL client (the computer which requests the HTTPS connection with
the switch), whereas the SSL client only should authenticate itself when the SSL server
requires it to do so. Authenticating client certificates is optional and if selected means the SSL-
client must send the switch a certificate. You must apply for a certificate for the browser from
a CA that is a trusted CA on the switch.
Please refer to the following figure.
1 HTTPS connection requests from an SSL-aware web browser go to port 443 (by default)
on the switch’s WS (web server).
2 HTTP connection requests from a web browser go to port 80 (by default) on the switch’s
WS (web server).
Figure 82 HTTPS Implementation
Note: If you disable HTTP in the Service Access Control screen, then the switch
blocks all HTTP connection attempts.
23.9 HTTPS Example
If you haven’t changed the default HTTPS port on the switch, then in your browser enter
“https://switch IP Address/” as the web site address where “switch IP Address” is the IP
address or domain name of the switch you wish to access.
23.9.1 Internet Explorer Warning Messages
When you attempt to access the switch HTTPS server, a Windows dialog box pops up asking
if you trust the server certificate. Click View Certificate if you want to verify that the
certificate is from the switch.
You see the following Security Alert screen in Internet Explorer. Select Ye s to proceed to the
web configurator login screen; if you select No, then web configurator access is blocked.