- Table of Contents
-
- 05-Network
- 01-VRF
- 02-Interface
- 03-Interface pairs
- 04-Interface collaboration
- 05-4G
- 06-Security zones
- 07-VLAN
- 08-MAC
- 09-DNS
- 10-ARP
- 11-ND
- 12-GRE
- 13-IPsec
- 14-ADVPN
- 15-L2TP
- 16-SSL VPN
- 17-Routing table
- 18-Static routing
- 19-Policy-based routing
- 20-OSPF
- 21-BGP
- 22-RIP
- 23-IP multicast routing
- 24-PIM
- 25-IGMP
- 26-DHCP
- 27-HTTP
- 28-SSH
- 29-NTP
- 30-FTP
- 31-Telnet
- 32-IP authentication
- 33-IPv4 whitelist
- 34-IPv6 whitelist
- 35-MAC access advanced settings
- 36-MAC authentication
- 37-MAC access silent MAC info
- 38-MAC address whitelist
- 39-Wireless
- Related Documents
-
Title | Size | Download |
---|---|---|
27-HTTP | 13.27 KB |
Introduction
The device provides a built-in Web server that supports HTTP 1.0, HTTP 1.1, and HTTPS. You can use a Web browser to log in to and configure the device.
HTTPS uses SSL to ensure the integrity and security of data exchanged between the client and the server, and is more secure than HTTP. You can define a certificate-based access control policy to allow only legal clients to access the Web interface.
After you enable HTTPS service on the device, the device uses a self-signed certificate (a certificate that is generated and signed by the device itself) and the default SSL settings.
The device can use ACLs to prevent unauthorized HTTP and HTTPS access. If the used ACLs exist and have rules, only users permitted by the ACLs can access the device through HTTP or HTTPS.