02-01-2025 07:32 AM
I have a Cisco IE-4010-16S12P running on IE4010-UNIVERSALK9-M (15.2(8)E5). I am able to login using http but not using https
Please see configuration on switch below:
SW02# sh run | i http
ip http server
ip http authentication local
ip http secure-server
ip http tls-version TLSv1.2
I see ERR_CONNECTION_CLOSED on the browser. I ran a wireshark and I see there are client hellos but no server hellos
Telnet on port 443 works. Please let me know if this is a self signed certificate issue, please suggest on the steps to fix this
Thanks in advance
Solved! Go to Solution.
02-01-2025 10:21 AM - edited 02-01-2025 10:30 AM
I just fixed the issue. The issue was that the rsa key wasnt mapped to the trustpoint on the switch where https was not working. I just mapped it and https is working now
02-01-2025 10:29 AM
Configuration changes made on switch:
crypto pki trustpoint TP-self-signed-858866176
rsakeypair TP-self-signed-2427818368
exit
02-01-2025 07:46 AM
1) Check logs on the switch when that happens (with the CLI )
2) Check the output from : show ip http server all
show ip http server secure status .
M
02-01-2025 07:52 AM
M.
02-01-2025 08:10 AM
SW02#show ip http server secure status
HTTP secure server status: Enabled
HTTP secure server port: 443
HTTP secure server ciphersuite: aes-128-cbc-sha aes-256-cbc-sha
dhe-aes-128-cbc-sha edche-rsa-aes-256-cbc-sha rsa-aes-cbc-sha2
rsa-aes-gcm-sha2 dhe-aes-cbc-sha2 dhe-aes-gcm-sha2
ecdhe-rsa-aes-cbc-sha2 ecdhe-rsa-aes-gcm-sha2
HTTP secure server TLS version: TLSv1.2
HTTP secure server client authentication: Disabled
HTTP secure server trustpoint:
HTTP secure server active session modules: ALL
I dont see any logs related to this on the switch
02-01-2025 08:19 AM - edited 02-01-2025 08:20 AM
- For logs enable debugging level logging and check again.
- Execute : % nmap --script ssl-enum-ciphers -p 443 switch-hostname
- Have you executed all steps from https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst_microswitches/software/releases/15_2_8_e/configuration_guide/security/b_1528e_security_cms_cg/configuring_secure_socket_layer_http.html
Initially it looked like no certificate has been created , for instance
M.
02-01-2025 08:24 AM
Not surprising that there are no logs, based on this output "HTTP secure server client authentication: Disabled" If server client authentication is disabled then there is no access, and no log message.
02-01-2025 09:06 AM
On another on same network where HTTPS works shows HTTP secure server client authentication: Disabled
02-01-2025 10:15 AM
It is very interesting that on one where HTTPS does work it still says Disabled. So the message seems to mean something different from what we thought it was.
Could you post the configuration of the problem switch and the configuration of a working switch?
02-01-2025 09:12 AM
This optional not mandatory for https'
SE can ask cert. Of PC for more secure.
It ok to be disable.
MHM
02-01-2025 08:42 AM
Change the browser
MHM
02-01-2025 09:32 AM
On a non working switch I found this:
Trustpoint TP-self-signed-858866176:
Issuing CA certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-2427818368
Fingerprint MD5: 56C56EE2 4F68BCA9 65F5510E CDE9EC34
Fingerprint SHA1: BC7BDE9C 604EE53F DA393377 40DE6BA3 8616EFC5
Router Not Set certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-2427818368
Fingerprint MD5: 56C56EE2 4F68BCA9 65F5510E CDE9EC34
Fingerprint SHA1: BC7BDE9C 604EE53F DA393377 40DE6BA3 8616EFC5
State:
Keys generated ............. No
Issuing CA authenticated ....... Yes
Certificate request(s) ..... Yes
--------------------------------------------------------------------------------
On a working switch I found this:
Trustpoint TP-self-signed-858866176:
Issuing CA certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-858866176
Fingerprint MD5: 857D7CA5 2486F18A 415D7104 60A6561B
Fingerprint SHA1: 8D943EDF 3D06A66A 9B5C8A5E 0BD1A707 55AF6A21
Router General Purpose certificate configured:
Subject Name:
cn=IOS-Self-Signed-Certificate-858866176
Fingerprint MD5: 857D7CA5 2486F18A 415D7104 60A6561B
Fingerprint SHA1: 8D943EDF 3D06A66A 9B5C8A5E 0BD1A707 55AF6A21
State:
Keys generated ............. Yes (General Purpose, non-exportable)
Issuing CA authenticated ....... Yes
Certificate request(s) ..... Yes
Could you please advise me on the next steps, to fix thus
02-01-2025 10:21 AM - edited 02-01-2025 10:30 AM
I just fixed the issue. The issue was that the rsa key wasnt mapped to the trustpoint on the switch where https was not working. I just mapped it and https is working now
02-01-2025 01:38 PM
Thanks for the update. Glad to know that you have found the solution to your own problem.
02-01-2025 10:29 AM
Configuration changes made on switch:
crypto pki trustpoint TP-self-signed-858866176
rsakeypair TP-self-signed-2427818368
exit
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide