Task 5: Configuring security Chapter 6: Configuration and alignment
6-32
phn-2513_004v000 (Oct 2012)
Configuring HTTPS/TLS
Perform this procedure if the unit is required to operate in HTTPS/TLS mode. For more
information, refer to Planning for HTTPS/TLS operation on page 2-23.
If FIPS 140-2 secure mode is required, refer to Configuring for FIPS 140-2 applications
on page 6-121 instead of this procedure.
To configure HTTPS/TLS, proceed as follows:
1
Ensure that the following cryptographic material has been generated:
Key Of Keys
TLS Private Key and Public Certificates (for the correct IP address)
User Defined Security Banner
Entropy Input
Wireless Link Encryption Key for AES
2
Identify the Port numbers for HTTPS, HTTP and Telnet.
3
Ensure that the web browsers used are enabled for HTTPS/TLS operation.
4
Select menu option Management, Web, Local User Accounts and check that:
EITHER: Identity Based User Accounts are ‘Disabled’,
OR: Identity Based User Accounts are ‘Enabled’. and the current user's role
is Security Officer.
5
Perform Task 3: Installing license keys on page 6-21 and ensure that the
installed license key meets all requirements including HTTPS/TLS compatibility:
Check that Encryption Algorithm is ‘AES….’.
If necessary, generate and enter a new license key with the above settings.
6
To activate HTTPS/TLS mode, perform Using the Security Wizard on page 6-33.
Comments to this Manuals