12-47
Cisco IE 2000 Switch Software Configuration Guide
OL-25866-01
Chapter 12 Configuring Switch-Based Authentication
Additional References
<output truncated>
crypto pki trustpoint TP-self-signed-3080755072
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3080755072
revocation-check none
rsakeypair TP-self-signed-3080755072
!
!
crypto ca certificate chain TP-self-signed-3080755072
certificate self-signed 01
3082029F 30820208 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
59312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 33303830 37353530 37323126 30240609 2A864886 F70D0109
<output truncated>
You can remove this self-signed certificate by disabling the secure HTTP server and entering the no
crypto pki trustpoint TP-self-signed-30890755072 global configuration command. If you late r
reenable a secure HTTP server, a new self-signed certificate is generated.
Verifying Secure HTTP Connection: Example
To verify the secure HTTP connection by using a Web browser, enter https://URL, where the URL is the
IP address or hostname of the server switch. If you configure a port other than the default port, you must
also specify the port number after the URL. For example:
https://209.165.129:1026
or
https://host.domain.com:1026
Additional References
The following sections provide references related to switch administration:
Related Documents
Related Topic Document Title
Cisco IE 2000 commands Cisco IE 2000 Switch Command Reference, Release 15.0(1)EY
Cisco IOS basic commands Cisco IOS Configuration Fundamentals Command Reference
Secure Copy Protocol configuration Cisco IOS Security Configuration Guide: Securing User Services
RADIUS Server Load Balancing configuration Cisco IOS Security Configuration Guide
Kerberos configuration examples Cisco IOS Security Configuration Guide: Security Server Protocols
Authenticating a network service Cisco IOS Security Configuration Guide: Security Server Protocols
Authenticating for KDC Cisco IOS Security Configuration Guide: Security Server Protocols
Kerberos configuration task list Cisco IOS Security Configuration Guide: Security Server Protocols
Login enhancement configuration Cisco IOS User Security Configuration Guide