HP 6125G HP 6125G & 6125G/XG Blade Switches Fundamentals Configuration - Page 62

Associate the HTTPS, policy-name, Security Configuration Guide, port-number

Page 62 highlights

Step Command 2. Associate the HTTPS service with an SSL server ip https ssl-server-policy policy. policy-name 3. Enable the HTTPS service. ip https enable 4. Associate the HTTPS service with a certificate attribute-based access control policy. ip https certificate access-control-policy policy-name 5. Specify the HTTPS service port number. ip https port port-number 56 Remarks By default, the HTTPS service is not associated with any SSL server policy, and the device uses a self-signed certificate for authentication. If you disable the HTTPS service, the system automatically de-associates the HTTPS service from the SSL service policy. Before re-enabling the HTTPS service, associate the HTTPS service with an SSL server policy first. If the HTTPS service has been enabled, any changes to the SSL server policy associated with the HTTP service that is enabled do not take effect. By default, HTTPS is disabled. Enabling the HTTPS service triggers an SSL handshake negotiation process. During the process, if the local certificate of the device exists, the SSL negotiation succeeds, and the HTTPS service can be started properly. If no local certificate exists, a certificate application process will be triggered by the SSL negotiation. Because the application process takes much time, the SSL negotiation often fails and the HTTPS service cannot be started normally. In that case, execute the ip https enable command multiple times to start the HTTPS service. Optional. By default, the HTTPS service is not associated with any certificate-based attribute access control policy. Associating the HTTPS service with a certificate-based attribute access control policy enables the device to control the access rights of clients. You must configure the client-verify enable command in the associated SSL server policy. If not, no clients can log in to the device. The associated SSL server policy must contain at least one permit rule. Otherwise, no clients can log in to the device. For more information about certificate attribute-based access control policies, see Security Configuration Guide. Optional. The default HTTPS service port is 443.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135

56
Step
Command
Remarks
2.
Associate the HTTPS
service with an SSL server
policy.
ip https ssl-server-policy
policy-name
By default, the HTTPS service is not
associated with any SSL server policy,
and the device uses a self-signed
certificate for authentication.
If you disable the HTTPS service, the
system automatically de-associates the
HTTPS service from the SSL service
policy. Before re-enabling the HTTPS
service, associate the HTTPS service with
an SSL server policy first.
If the HTTPS service has been enabled,
any changes to the SSL server policy
associated with the HTTP service that is
enabled do not take effect.
3.
Enable the HTTPS service.
ip https enable
By default, HTTPS is disabled.
Enabling the HTTPS service triggers an
SSL handshake negotiation process.
During the process, if the local certificate
of the device exists, the SSL negotiation
succeeds, and the HTTPS service can be
started properly. If no local certificate
exists, a certificate application process
will be triggered by the SSL negotiation.
Because the application process takes
much time, the SSL negotiation often fails
and the HTTPS service cannot be started
normally. In that case, execute the
ip
https enable
command multiple times to
start the HTTPS service.
4.
Associate the HTTPS
service with a certificate
attribute-based access
control policy.
ip https certificate
access-control-policy
policy-name
Optional.
By default, the HTTPS service is not
associated with any certificate-based
attribute access control policy.
Associating the HTTPS service with a
certificate-based attribute access control
policy enables the device to control the
access rights of clients.
You must configure the
client-verify
enable
command in the associated SSL
server policy. If not, no clients can log in
to the device.
The associated SSL server policy must
contain at least one
permit
rule.
Otherwise, no clients can log in to the
device.
For more information about certificate
attribute-based access control policies,
see
Security Configuration Guide
.
5.
Specify the HTTPS service
port number.
ip https port
port-number
Optional.
The default HTTPS service port is 443.