4. Save the HTTPS certificate.
Browser-Based Interface Summary
© Copyright Lenovo 2016
Accessing the BBI via HTTPS requires that you generate a certificate to be used
during the key exchange. A default certificate is created the first time HTTPS is
enabled, but you can create a new certificate defining the information you want to
be used in the various fields.
RS G8264(config)# access https generatecertificate
Country Name (2 letter code) [US]:
State or Province Name (full name) [CA]:
Locality Name (eg, city) [Santa Clara]:
Organization Name (eg, company) [Lenovo Networking Operating System]:
Organizational Unit Name (eg, section) [Network Engineering]:
Common Name (eg, YOUR name) [0.0.0.0]:
Email (eg, email address) []:
Confirm generating certificate? [y/n]: y
Generating certificate. Please wait (approx 30 seconds)
restarting SSL agent
The certificate is valid only until the switch is rebooted. To save the certificate so it
is retained beyond reboot or power cycles, use the following command:
RS G8264(config)# access https savecertificate
When a client (such as a web browser) connects to the switch, the client is asked to
accept the certificate and verify that the fields match what is expected. Once BBI
access is granted to the client, the BBI can be used.
The BBI is organized at a high level as follows:
Context buttons—These buttons allow you to select the type of action you wish to
perform. The Configuration button provides access to the configuration elements
for the entire switch. The Statistics button provides access to the switch statistics
and state information. The Dashboard button allows you to display the settings and
operating status of a variety of switch features.
Navigation Window—Provides a menu of switch features and functions:
System—Provides access to the configuration elements for the entire switch.
Switch Ports—Configure each of the physical ports on the switch.
Port‐Based Port Mirroring—Configure port mirroring behavior.
Layer 2—Configure Layer 2 features for the switch.
RMON Menu—Configure Remote Monitoring features for the switch.
Layer 3—Configure Layer 3 features for the switch.
QoS—Configure Quality of Service features for the switch.
Access Control—Configure Access Control Lists to filter IP packets.
CEEConfigure Converged Enhanced Ethernet (CEE).
FCoEConfigure FibreChannel over Ethernet (FCoE).
Virtualization—Configure vNICs and VMready for virtual machines (VMs).
Chapter 1: Switch Administration
41