Supermicro L2/L3 Switches Configuration Guide
Step Command Description
Enters the configuration mode
ip http secure { server | ciphersuite [rsa
[rsa-null-sha] [rsa-des-sha] [rsa-3des-sha] [dh-rsa-
des-sha ][dh-rsa-3des-sha][rsa-exp1024-des-sha] |
crypto key rsa [usage-keys (512|1024)] }
server – Enables an HTTPS server
ciphersuite – Specifies one or many of
the supported encryption algorithms to
be used.
crypto key rsa – Encryption key, either
512 or 1024.
Exits the configuration mode.
show ip http secure server status
to be part of the startup configuration.
no ip http secure { server | ciphersuite [rsa
[rsa-3des-sha] [dh-rsa-des-sha ][dh-rsa-3des-sha][rsa-exp1024-des-sha] |
crypto key rsa [usage-keys (512|1024)] }” command enables the agent.
The example below shows the commands used to configure a secure HTTP.
SMIS# configure terminal
SMIS(config)# no ip http secure server
SMIS(config)# end
SMIS# show ip http secure server status
HTTP secure server status: Disabled
HTTP secure server ciphersuite: RSA-DES-SHA:RSA-3DES-SHA:RSA-EXP1024-DES-SHA:
HTTP crypto key rsa 1024
1.8.5.2 Certificate Signing Request (CSR)
An SSL certificate provides security for online communications. Before requesting an SSL certificate,
a Certificate Signing Request (CSR) must be generated and submitted to the Certification Authority (CA).
CAs manage these requests and issue certificates to participating network devices. These services
provide a centralized security key and certificate management for the participating devices. CA servers
are called as trustpoints, e.g. thawte.com.
Supermicro switches c
reate a Certificate Signing Request (CSR) using an RSA key pair and switch
identification.
Follow the steps below to configure a
Certificate Signing Request (CSR)
.