07-System Volume

05-HTTP Configuration

Chapters Download  (100.28 KB)

05-HTTP Configuration


HTTP Configuration

When configuring HTTP, go to these sections for information you are interested in:

l          HTTP Overview

l          Enabling the HTTP Service

l          HTTP Configuration

l          Associating the HTTP Service with an ACL

l          Displaying and Maintaining HTTP

HTTP Overview

The Hypertext Transfer Protocol (HTTP) is used for transferring web page information across the Internet. It is an application-level protocol in the TCP/IP protocol suite. The connection-oriented Transport Control Protocol (TCP) is adopted on the transport layer.

Currently, HTTP/1.0 is supported on the device.

How HTTP Works

In the HTTP, the client/server mode is used for communication. The client and the server exchange messages following these procedures:

1)        A TCP connection is created between the client and the server. Typically, the port number is 80.

2)        The client sends a request to the server.

3)        The server processes the request and sends back a response.

4)        The TCP connection is closed.

Logging In to the Device Through HTTP

You can log onto the device using the HTTP protocol with HTTP service enabled, accessing and controlling the device with Web-based network management.

To implement security management on the device, you can use the following methods to enhance the security of the device.

l          Enable HTTP service only when necessary.

l          Change the port number of the HTTP service as a port number not commonly used (80 or 8080), thus reducing attacks from illegal users on the HTTP service.

l          Associate the HTTP service with an ACL to let pass only the filtered clients.

Protocols and Standards

RFC 1945: Hypertext Transfer Protocol – HTTP/1.0

Enabling the HTTP Service

The device can act as the HTTP server and the users can access and control the device through the Web function only after the HTTP service is enabled.

Follow these steps to enable the HTTP service:

To do…

Use the command…

Remarks

Enter system view

system-view

Enable the HTTP service

ip http enable

Required

Enabled by default.

 

Configuring the Port Number of the HTTP Service

Configuration of the port number of the HTTP service can reduce the attacks from illegal users on the HTTP service.

Follow these steps to configure the port number of the HTTP service:

To do…

Use the command…

Remarks

Enter system view

system-view

Configure the port number of the HTTP service

ip http port port-number

Required

By default, the port number of the HTTP service is 80.

 

If you execute the ip http port command for multiple times, the last configured port number is used.

 

Associating the HTTP Service with an ACL

By associating the HTTP service with an ACL, only the clients that pass ACL filtering are allowed to access the device.

Follow these steps to associate the HTTP service with an ACL:

To do…

Use the command…

Remarks

Enters system view

system-view

Associate the HTTP service with an ACL

ip http acl acl-number

Required

The HTTP service is not associated with an ACL by default.

 

l          If you execute the ip http acl command for multiple times to associate the HTTP with ACLs, the HTTP service is only associated with the last specified ACL.

l          For the detailed introduction to ACL, refer to ACL Configuration in the Security Volume.

 

Displaying and Maintaining HTTP

To do…

Use the command…

Remarks

Display information about HTTP

display ip http

Available in any view

 


When configuring HTTPS, go to these sections for information you are interested in:

l          HTTPS Overview

l          HTTPS Configuration Task List

l          Associating the HTTPS Service with an SSL Server Policy

l          Enabling the HTTPS Service

l          Associating the HTTPS Service with a Certificate Attribute Access Control Policy

l          Configuring the Port Number of the HTTPS Service

l          Associating the HTTPS Service with an ACL

l          Displaying and Maintaining HTTPS

l          HTTPS Configuration Example

HTTPS Overview

The Secure HTTP (HTTPS) refers to the HTTP protocol that supports the Security Socket Layer (SSL) protocol.

The SSL protocol of HTTPS enhances the security of the device in the following ways:

l          Uses the SSL protocol to ensure the legal clients to access the device securely and prohibit the illegal clients;

l          Encrypts the data exchanged between the HTTPS client and the device to ensure the data security and integrity, thus realizing the security management of the device;

l          Defines certificate attribute-based access control policy for the device to control the access right of the client, in order to further avoid attacks from illegal clients.

 

l          The total number of HTTP connections and HTTPS connections on a device cannot exceed ten.

l          For SSL details, refer to SSL Configuration in the Security Volume.

 

HTTPS Configuration Task List

Complete these tasks to configure HTTPS:

Configuration task

Remarks

Associating the HTTPS Service with an SSL Server Policy

Required

Enabling the HTTPS Service

Required

Associating the HTTPS Service with a Certificate Attribute Access Control Policy

Optional

Configuring the Port Number of the HTTPS Service

Optional

Associating the HTTPS Service with an ACL

Optional

 

Associating the HTTPS Service with an SSL Server Policy

You need to associate the HTTPS service with a created SSL server policy before enabling the HTTPS service.

 Follow these steps to associate the HTTPS service with an SSL server policy:

To do…

Use the command…

Remarks

Enter system view

system-view

Associate the HTTPS service with an SSL server policy

ip https ssl-server-policy policy-name

Required

Not associated by default

 

l          If the ip https ssl-server-policy command is executed repeatedly, the HTTPS service is only associated with the last specified SSL server policy.

l          When the HTTPS service is disabled, the association between the HTTPS service and the SSL server is automatically removed. To enable it again, you need to re-associate the HTTPS service with an SSL server policy.

l          When the HTTPS service is enabled, no modification of its associated SSL server policy takes effect.

 

Enabling the HTTPS Service

The device can act as the HTTPS server and users can access and control the device through the Web function only when the HTTPS service is enabled.

Follow these steps to enable the HTTPS service:

To do…

Use the command…

Remarks

Enter system view

system-view

Enable the HTTPS service

ip https enable

Required

Disabled by default.

 

l          After the HTTPS service is enabled, you can use the display ip https command to view the state of the HTTPS service and verify the configuration.

l          Enabling of the HTTPS service will trigger an SSL handshake negotiation process. During the process, if the local certificate of the device already exists, the SSL negotiation is successfully performed, and the HTTPS service can be started normally. If no local certificate exists, a certificate application process will be triggered by the SSL negotiation. Since the application process takes much time, the SSL negotiation may fail and the HTTPS service cannot be started normally. Therefore, the ip https enable command must be executed for multiple times to ensure normal startup of the HTTPS service.

 

Associating the HTTPS Service with a Certificate Attribute Access Control Policy

Associating the HTTPS service with a configured certificate access control policy helps control the access right of the client, thus providing the device with enhanced security.

Follow these steps to associate the HTTPS service with a certificate attribute access control policy:

To do…

Use the command…

Remarks

Enter system view

system-view

Associate the HTTPS service with a certificate attribute access control policy

ip https certificate access-control-policy policy-name

Required

Not associated by default.

 

l          If the ip https certificate access-control-policy command is executed repeatedly, the HTTPS server is only associated with the last specified certificate attribute access control policy.

l          If the HTTPS service is associated with a certificate attribute access control policy, the client-verify enable command must be configured in the SSL server policy. Otherwise, the client cannot log onto the device.

l          If the HTTPS service is associated with a certificate attribute access control policy, the latter must contain at least one permit rule. Otherwise, no HTTPS client can log onto the device.

l           For the configuration of an SSL server policy, refer to PKI Configuration in the Security Volume.

 

Configuring the Port Number of the HTTPS Service

Configuration of the port number of the HTTPS service can reduce the attacks from illegal users on the HTTPS service.

Follow these steps to configure the port number of the HTTPS service:

To do…

Use the command…

Remarks

Enter system view

system-view

Configure the port number of the HTTPS service

ip https port port-number

Optional

By default, the port number of the HTTPS service is 443.

 

If you execute the ip https port command for multiple times, the last configured port number is used.

 

Associating the HTTPS Service with an ACL

Associating the HTTPS service with an ACL can filter out requests from some clients to let pass only clients that pass the ACL filtering.

Follow these steps to associate the HTTPS service with an ACL:

To do…

Use the command…

Remarks

Enter system view

system-view

Associate the HTTPS service with an ACL

ip https acl acl-number

Required

Not associated by default.

 

l          If you execute the ip https acl command for multiple times to associate the HTTPS service with ACLs, the HTTPS service is only associated with the last specified ACL.

l          For the detailed introduction to ACL, refer to ACL Configuration in the Security Volume.

 

Displaying and Maintaining HTTPS

To do…

Use the command…

Remarks

Display information about HTTPS

display ip https

Available in any view

 

HTTPS Configuration Example

Network requirements

l          Host acts as the HTTPS client and Device acts as the HTTPS server.

l          Host accesses Device through Web to control Device.

l          CA (Certificate Authority) issues certificate to Device. The common name of CA is new-ca.

 

In this configuration example, Windows Server serves as CA and you need to install Simple Certificate Enrollment Protocol (SCEP) component.

 

Figure 2-1 Network diagram for HTTPS configuration

 

Configuration procedure

Perform the following configurations on Device:

1)        Apply for a certificate for Device

# Configure a PKI entity.

<Device> system-view

[Device] pki entity en

[Device-pki-entity-en] common-name http-server1

[Device-pki-entity-en] fqdn ssl.security.com

[Device-pki-entity-en] quit

# Configure a PKI domain.

[Device] pki domain 1

[Device-pki-domain-1] ca identifier new-ca

[Device-pki-domain-1] certificate request url http://10.1.2.2:8080/certsrv/mscep/mscep.dll

[Device-pki-domain-1] certificate request from ra

[Device-pki-domain-1] certificate request entity en

[Device-pki-domain-1] quit

# Generate a local RSA key pair.

[Device] public-key local create rsa

# Obtain a server certificate from CA.

[Device] pki retrieval-certificate ca domain 1

# Apply for a local certificate.

[Device] pki request-certificate domain 1

2)        Configure an SSL server policy associated with the HTTPS service

# Configure an SSL server policy.

[Device] ssl server-policy myssl

[Device-ssl-server-policy-myssl] pki-domain 1

[Device-ssl-server-policy-myssl] client-verify enable

[Device-ssl-server-policy-myssl] quit

3)        Configure a certificate access control policy

# Configure a certificate attribute group.

[Device] pki certificate attribute-group mygroup1

[Device-pki-cert-attribute-group-mygroup1] attribute 1 issuer-name dn ctn new-ca

[Device-pki-cert-attribute-group-mygroup1] quit

# Configure certificate access control policy myacp and create a control rule.

[Device] pki certificate access-control-policy myacp

[Device-pki-cert-acp-myacp] rule 1 permit mygroup1

[Device-pki-cert-acp-myacp] quit

4)        Reference an SSL server policy

# Associate the HTTPS service with the SSL server policy myssl.

[Device] ip https ssl-server-policy myssl

5)        Associate the HTTPS service with a certificate attribute access control policy

# Associate the HTTPS service with certificate attribute access control policy myacp.

[Device] ip https certificate access-control-policy myacp

6)        Enable the HTTPS service

# Enable the HTTPS service.

[Device] ip https enable

7)        Verify the configuration

Launch the IE explorer on Host, and enter https://10.1.1.1. You can log in to Device and control it.

 

l          The URL of the HTTPS server starts with https://, and that of the HTTP server starts with http://.

l          For details of PKI commands, refer to PKI Commands in the Security Volume.

l          For details of the public-key local create rsa command, refer to Public Key Commands in the Security Volume.

l          For details of SSL commands, refer to SSL Commands in the Security Volume.

 

H3C reserves the right to modify its collaterals without any prior notice. For the latest information of the collaterals, please consult H3C sales or call 400 hotline.