Dell Force10 MXL Blade Note d'application - Page 5

Parcourez en ligne ou téléchargez le pdf Note d'application pour {nom_de_la_catégorie} Dell Force10 MXL Blade. Dell Force10 MXL Blade 6 pages. 10/40gbe blade switches
Également pour Dell Force10 MXL Blade : Manuel de démarrage (38 pages), Spécifications (2 pages), Manuel (27 pages)

Dell Force10 MXL Blade Note d'application
Certificate file transfer operation completed successfully
SFTOS #copy tftp://192.168.0.10/rootcert.pem nvram:sslpem-root
Mode........................................... TFTP
Set TFTP Server IP............................. 192.168.0.10
TFTP Path......................................
TFTP Filename.................................. rootcert.pem
Data Type...................................... SSL Root cert
Management access will be blocked for the duration of the transfer
Are you sure you want to start? (y/n) y
TFTP SSL certificate receive complete... updating certificate file...
Certificate file transfer operation completed successfully
3. Enable the HTTPS server with this command.
SFTOS Version <= 2.2.1
(SFTOS) #ip http secure-server
To verify that the server has started, use this command to show the HTTPS server status and check the log file for
the following messages.
SFTOS #show ip http
Java Mode: Disabled
HTTP Mode (Unsecure): Disabled
HTTP Mode (Secure): Enabled
Secure Port: 443
Secure Protocol Level(s): TLS1 SSL3
SFTOS #show logging buffered
JAN 01 01:16:19 192.168.0.34-1 UNKN[209189968]: sslt_util.c(321) 39 %% SSLT: Successfully
loaded all required SSL PEM files
Using a web browser, connect to the switch using an https:// URL and login to verify that the SSL server is working.
The padlock icon on your browser should indicate an encrypted connection.
If you used the example certificates, your browser will display a warning that it cannot verify the authenticity of the
certificate. This is because the example certificates have not been certified by a Certification Authority. When
certificates are acquired from a Certification Authority and loaded on the switch this warning will not occur.
4. Once you have verified that you can connect to the switch with a web browser, the HTTP server can be disabled
with this command for additional security if it was enabled previously. The HTTP server is disabled by default.
SFTOS Version <= 2.2.1
(SFTOS) #no ip http server
S-Series Secure Management
SFTOS (Config)#ip http secure-server enable
SFTOS (Config)#no ip http server enable
- 5 -
SFTOS Version >= 2.3.1
SFTOS Version >= 2.3.1