10 M AKING YOUR NETWORK SECUREThis chapter outlines the Port Security and Switch Management Loginfeatures, explains the key benefits of using these features, and givesexamples of how and why you would use them in your network.For detailed descriptions of the Web interface operations and theCommand Line Interface (CLI) commands that you require to manage theSwitch please refer to the Management Interface Reference Guidesupplied in HTML format on the CD-ROM that accompanies your Switch.Securing Access tothe Web InterfaceYour Switch supports HTTPS, allowing secure access to the Web interfaceof the Switch.If you adminster your switch remotely or over an insecure network, theSwitch can encrypt all HTTP traffic to and from the Web interface usingthe Secure Sockets Layer (SSL) of HTTP. If your network traffic isintercepted, no passwords or configuration information will be visible inthe data.To use HTTPS you need the following:■ A browser that supports SSL■ A digital certificate installed on the SwitchThe Switch generates its own certificate the first time it is powered on.This is the default certificate for the Switch. As it has not been validatedby a Certifying Authority your browser may warn you that certificate hasnot been certified.Once you have obtained a digital certificate and installed it, you will beable to securely browse your Switch by using browsinghttps://xxx.xxx.xxx.xxx/ where xxx.xxx.xxx.xxx is the IP address ofyour Switch.