F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices Getting Started Command Reference-6PW100
20
ACLs of the same type overwrite each other. If you execute the ip https acl command multiple times to
associate the HTTPS service with ACLs of the same type, the HTTPS service is only associated with the last
specified ACL.
Examples
# Associate the HTTPS service with ACL 2001 to only allow the clients within the 10.10.0.0/16 network
segment to access the HTTPS server through HTTP.
<Sysname> system-view
[Sysname] acl number 2001
[Sysname-acl-basic-2001] rule permit source 10.10.0.0 0.0.255.255
[Sysname-acl-basic-2001] quit
[Sysname] ip https acl 2001
Related commands
• display ip https
• acl number (ACL and QoS Command Reference)
ip https certificate access-control-policy
Use ip https certificate access-control-policy to associate the HTTPS service with a certificate attribute
access control policy.
Use undo ip https certificate access-control-policy to remove the association.
Syntax
ip https certificate access-control-policy policy-name
undo ip https certificate access-control-policy
Default
The HTTPS service is not associated with any certificate attribute access control policy.
Views
System view
Default command level
3: Manage level
Parameters
policy-name: Name of the certificate attribute access control policy, a string of 1 to 16 characters.
Usage guidelines
Association of the HTTPS service with a certificate attribute access control policy can control the access
rights of clients.
Examples
# Associate the HTTPS server to certificate attribute access control policy myacl.
<Sysname> system-view
[Sysname] ip https certificate access-control-policy myacl
Related commands
• display ip https
• pki certificate access-control-policy (Security Command Reference)