Configuring the Switch
3-34
3
CLI – Specify all the required parameters to enable logon authentication.
Configuring HTTPSYou can configure the switch to enable the Secure Hypertext Transfer Protocol
(HTTPS) over the Secure Socket Layer (SSL), providing secure access (i.e., an
encrypted connection) to the switch’s web interface.
Command Usage
• Both the HTTP and HTTPS service can be enabled independently on the switch.
However, you cannot configure both services to use the same UDP port.
• If you enable HTTPS, you must indicate this in the URL that you specify in your
browser: https://device[:port_number]
• When you start HTTPS, the connection is established in this way:
- The client authenticates the server using the server’s digital certificate.
- The client and server negotiate a set of security protocols to use for the
connection.
- The client and server generate session keys for encrypting and decrypting data.
• The client and server establish a secure encrypted connection.
A padlock icon should appear in the status bar for Internet Explorer 5.x or above
and Netscape Navigator 6.2 or above.
Console(config)#authentication login radius 4-69
Console(config)#radius-server host 192.168.1.25 4-71
Console(config)#radius-server port 181 4-71
Console(config)#radius-server key green 4-72
Console(config)#radius-server retransmit 5 4-72
Console(config)#radius-server timeout 10 4-73
Console(config)#end
Console#show radius-server 4-73
Remote radius server configuration:
Server IP address: 192.168.1.25
Communication key with radius server: green
Server port number: 181
Retransmit times: 5
Request timeout: 10
Console(config)#authentication login tacacs 4-69
Console(config)#tacacs-server host 10.20.30.40 4-74
Console(config)#tacacs-server port 200 4-74
Console(config)#tacacs-server key green 4-75
Console(config)#end
Console#show tacacs-server 4-75
Remote TACACS server configuration:
Server IP address: 10.20.30.40
Communication key with TACACS server: green
Server port number: 200
Console#