96 
HTTPS CONFIGURATION
When configuring HTTPS, go to these sections for information you are interested 
in:
■ “HTTPS Overview” on page 1213
■ “HTTPS Configuration Task List” on page 1213
■ “Associating the HTTPS Service with an SSL Server Policy” on page 1214
■ “Enabling the HTTPS Service” on page 1214
■ “Associating the HTTPS Service with a Certificate Attribute Access Control 
Policy” on page 1215
■ “Associating the HTTPS Service with an ACL” on page 1215
■ “Displaying and Maintaining HTTPS” on page 1215
■ “HTTPS Configuration Example” on page 1215
HTTPS Overview The HTTP Security (HTTPS) refers to the HTTP protocol that supports the Security 
Socket Layer (SSL) protocol.
The SSL protocol of HTTPS enhances the security of the device in the following 
ways:
■ Uses the SSL protocol to ensure the legal clients to access the device securely 
and prohibit the illegal clients;
■ Encrypts the data exchanged between the HTTPS client and the device to 
ensure the data security and integrity, thus realizing the security management 
of the device;
■ Defines certificate attribute-based access control policy for the device to control 
the access right of the client, in order to further avoid attacks from illegal 
clients.
n
The total number of HTTP connections and HTTPS connections on a device cannot 
exceed five.
HTTPS Configuration 
Task List
Complete these tasks to configure HTTPS:
Configuration task  Remarks 
“Associating the HTTPS Service with an SSL Server Policy” on page 1214  Required 
“Enabling the HTTPS Service” on page 1214  Required 
“Associating the HTTPS Service with a Certificate Attribute Access Control Policy” 
on page 1215 
Optional