EasyManuals Logo
Home>Cisco>Switch>Catalyst 2960-X

Cisco Catalyst 2960-X User Manual

Cisco Catalyst 2960-X
498 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #150 background imageLoading...
Page #150 background image
SSL evolved into Transport Layer Security (TLS) in 1999, but is still used in this particular context.Note
The primary role of the HTTP secure server (the switch) is to listen for HTTPS requests on a designated port
(the default HTTPS port is 443) and pass the request to the HTTP 1.1 Web server. The HTTP 1.1 server
processes requests and passes responses (pages) back to the HTTP secure server, which, in turn, responds to
the original request.
The primary role of the HTTP secure client (the web browser) is to respond to Cisco IOS application requests
for HTTPS User Agent services, perform HTTPS User Agent services for the application, and pass the response
back to the application.
Certificate Authority Trustpoints
Certificate authorities (CAs) manage certificate requests and issue certificates to participating network devices.
These services provide centralized security key and certificate management for the participating devices.
Specific CA servers are referred to as trustpoints.
When a connection attempt is made, the HTTPS server provides a secure connection by issuing a certified
X.509v3 certificate, obtained from a specified CA trustpoint, to the client. The client (usually a Web browser),
in turn, has a public key that allows it to authenticate the certificate.
For secure HTTP connections, we highly recommend that you configure a CA trustpoint. If a CA trustpoint
is not configured for the device running the HTTPS server, the server certifies itself and generates the needed
RSA key pair. Because a self-certified (self-signed) certificate does not provide adequate security, the connecting
client generates a notification that the certificate is self-certified, and the user has the opportunity to accept
or reject the connection. This option is useful for internal network topologies (such as testing).
If you do not configure a CA trustpoint, when you enable a secure HTTP connection, either a temporary or
a persistent self-signed certificate for the secure HTTP server (or client) is automatically generated.
If the switch is not configured with a hostname and a domain name, a temporary self-signed certificate
is generated. If the switch reboots, any temporary self-signed certificate is lost, and a new temporary
new self-signed certificate is assigned.
If the switch has been configured with a host and domain name, a persistent self-signed certificate is
generated. This certificate remains active if you reboot the switch or if you disable the secure HTTP
server so that it will be there the next time you re-enable a secure HTTP connection.
The certificate authorities and trustpoints must be configured on each device individually. Copying them
from other devices makes them invalid on the switch.
When a new certificate is enrolled, the new configuration change is not applied to the HTTPS server until
the server is restarted. You can restart the server using either the CLI or by physical reboot. On restarting
the server, the switch starts using the new certificate.
Note
If a self-signed certificate has been generated, this information is included in the output of the show
running-config privileged EXEC command. This is a partial sample output from that command displaying
a self-signed certificate.
Switch# show running-config
Building configuration...
Catalyst 2960-X Switch Security Configuration Guide, Cisco IOS Release 15.0(2)EX
126 OL-29048-01
Configuring Secure Socket Layer HTTP
Certificate Authority Trustpoints

Table of Contents

Other manuals for Cisco Catalyst 2960-X

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco Catalyst 2960-X and is the answer not in the manual?

Cisco Catalyst 2960-X Specifications

General IconGeneral
Console portRJ-45
USB 2.0 ports quantity2
SFP module slots quantity4
Installed SFP modules quantity-
Gigabit Ethernet (copper) ports quantity48
Basic switching RJ-45 Ethernet ports typeGigabit Ethernet (10/100/1000)
Power sourceAC
Input current5 A
AC input voltage100 - 240 V
Power consumption (typical)60.9 W
Number of power supply units1
Redundant power supply (RPS) supportYes
Operating altitude0 - 3000 m
Non-operating altitude0 - 4000 m
Storage temperature (T-T)-25 - 70 °C
Operating temperature (T-T)-5 - 40 °C
Operating relative humidity (H-H)10 - 95 %
Switching protocolsUDP, TCP, RADIUS/TACACS+
Number of VLANs1023
Networking standardsIEEE 802.1ab, IEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1s, IEEE 802.1w, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3ad, IEEE 802.3ae, IEEE 802.3af, IEEE 802.3ah, IEEE 802.3at, IEEE 802.3az, IEEE 802.3u, IEEE 802.3x, IEEE 802.3z
Throughput107.1 Mpps
Jumbo frames9216
Number of queues8
MAC address table16000 entries
Number of static routes1000
DHCP featuresDHCP server
AuthenticationMAC-based authentication, Port-based authentication
Security algorithms802.1x RADIUS, SNMP, SSH
Access Control List (ACL) rules3
Switch typeManaged
Switch layerL2/L3
SafetyUL 60950-1, CAN/CSA-C22.2 No. 60950-1, EN 60950-1, IEC 60950-1, AS/NZS 60950-1
Form factor1U
Product colorBlack
Total Power over Ethernet (PoE) budget370 W
Power over Ethernet (PoE) ports quantity24
Power over Ethernet plus (PoE+) ports quantity12
Memory typeDRAM
Noise level39 dB
Flash memory128 MB
Internal memory512 MB
Processor frequency600 MHz
Mean time between failures (MTBF)276870 h
Weight and Dimensions IconWeight and Dimensions
Depth368 mm
Width445 mm
Height45 mm
Weight5800 g

Related product manuals