Cisco Systems OL-25712-04 Security Camera User Manual


 
The CIM-XML area expands to display the available configuration options.
Step 5
(Optional) In the Port field, change the default port that Cisco UCS Manager GUI will use for CIM-XML.
The default port is 5988.
Step 6
Click Save Changes.
Configuring HTTP
Procedure
Step 1
In the Navigation pane, click the Admin tab.
Step 2
On the Admin tab, expand All > Communication Management > Communication Services.
Step 3
Click the Communication Services tab.
Step 4
In the HTTP area, click the enabled radio button.
The HTTP area expands to display the available configuration options.
Step 5
(Optional) In the Port field, change the default port that Cisco UCS Manager GUI uses for HTTP.
The default port is 80.
Step 6
(Optional) In the Redirect HTTP to HTTPS field, click the enabled radio button.
You must also configure and enable HTTPS to enable redirection of HTTP logins to the HTTPS login. Once
enabled, you cannot disable the redirection until you have disabled HTTPS.
If you redirectHTTP to HTTPS, you cannot use HTTP to access Cisco UCS Manager GUI. Redirection
disables HTTP as it automatically redirects to HTTPS.
Note
Step 7
Click Save Changes.
Configuring HTTPS
Certificates, Key Rings, and Trusted Points
HTTPS uses components of the Public Key Infrastructure (PKI) to establish secure communications between
two devices, such as a client's browser and Cisco UCS Manager.
Encryption Keys and Key Rings
Each PKI device holds a pair of asymmetric Rivest-Shamir-Adleman (RSA) encryption keys, one kept private
and one made public, stored in an internal key ring. A message encrypted with either key can be decrypted
with the other key. To send an encrypted message, the sender encrypts the message with the receiver's public
key, and the receiver decrypts the message using its own private key. A sender can also prove its ownership
of a public key by encrypting (also called 'signing') a known message with its own private key. If a receiver
can successfully decrypt the message using the public key in question, the sender's possession of the
corresponding private key is proven. Encryption keys can vary in length, with typical lengths from 512 bits
Cisco UCS Manager GUI Configuration Guide, Release 2.0
OL-25712-04 115
Configuring HTTP