Example: Configuring Secure Web Access
This example shows how to configure secure Web access on your device.
No special configuration beyond device initialization is required before configuring this feature.
You can enable HTTPS access on specified interfaces. If you enable HTTPS without specifying an interface, HTTPS is enabled on all interfaces.
In this example, you import the SSL certificate that you have generated as a new and private key in PEM format. You then enable HTTPS access and specify the SSL certificate to be used for authentication. Finally, you specify the port as 8443 on which HTTPS access is to be enabled.
CLI Quick Configuration
To quickly configure this example, copy the following commands, paste them into a text file, remove any line breaks, change any details necessary to match your network configuration, copy and paste the commands into the CLI at the  hierarchy level, and then enter commit from configuration mode.
To configure secure Web access on your device:
- Import the SSL certificate and private key.[edit security]user@host# set certificates local new load-key-file /var/tmp/new.pem
- Enable HTTPS access and specify the SSL certificate and
port.[edit system]user@host# set services web-management https local-certificate new port 8443
From configuration mode, confirm your configuration by entering the show security command. If the output does not display the intended configuration, repeat the configuration instructions in this example to correct it.
If you are done configuring the device, enter commit from configuration mode.
Confirm that the configuration is working properly.
Verifying an SSL Certificate Configuration
Verify the SSL certificate configuration.
From operational mode, enter the show security command.
Verifying a Secure Access Configuration
Verify the secure access configuration.
From operational mode, enter the show system services command. The following sample output displays the sample values for secure Web access: