60-32
User Guide for Cisco Security Manager 4.4
OL-28826-01
Chapter 60 Router Device Administration
HTTP Policy Page
Field Reference
HTTP Page—AAA Tab
Use the AAA tab of the HTTP page to define the authentication and authorization methods to perform
on users who attempt to access the router using HTTP or HTTPS.
Navigation Path
Go to the HTTP Policy Page, page 60-31, then click the AAA tab.
Related Topics
HTTP Page—Setup Tab, page60-31
HTTP and HTTPS on Cisco IOS Routers, page 60-28
Filtering Tables, page1-45
Table60-13 HTTP Page—Setup Tab
Element Description
Enable HTTP When selected, an HTTP server is enabled on the router.
When deselected, HTTP is disabled on the router. This is the default for
devices that were not discovered.
HTTP Port The port number to use for HTTP. Valid values are 80 or any value from
1024 to 65535. The default is 80.
Enable SSL When selected, a secure HTTP server (HTTP over SSL or HTTPS) is
enabled on the router.
When deselected, HTTPS is disabled. This is the default for devices
that were not discovered.
Note If SSL is disabled (or if the HTTP policy as a whole is
unassigned), Security Manager cannot communicate with the
device after deployment unless you change the transport
protocol for this device to SSH. This setting can be found in
Device Properties.
Note We recommend that you disable HTTP when SSL is enabled.
This is required to ensure only secure connections to the server.
SSL Port The port number to use for HTTPS. Valid values are 443 or any value
from 1025 to 65535. The default is 443.
Allow Connection From The name of the standard numbered ACL that restricts use of HTTP and
HTTPS on this device. Enter the name of an ACL object, or click Select
to select it. If the object that you want is not listed, click the Create
button to create it.
Note If you define an ACL, make sure that it includes the Security
Manager server. Otherwise, Security Manager cannot
communicate with this device using SSL.