2.Verify the configuration:
# On the PC, launch a Web browser and enter the IP address of the interface in the address bar. The Web login page appears, as shown in Figure 48.
Figure 48 Web login page
#Enter the username, password, verification code, and click Login. The homepage appears. After login, you can configure device settings through the Web interface.
HTTPS login configuration exampleNetwork requirements
As shown in Figure 49, to prevent unauthorized users from accessing the firewall, configure the firewall as the HTTPS server and the host as the HTTPS client, and request a certificate for each of them.
Figure 49 Network diagram
Configuration procedure
This example assumes that the CA is named
1.Configure the firewall (HTTPS server):
#Configure a PKI entity, configure the common name of the entity as
<Firewall>
58