19.11 Configuring HTTPS-only communication with the NNMi console
The most effective method of preventing HTTP access to the NNMi console is to place the NNMi management server behind a firewall that permits only HTTPS access to the protected systems.
Using a firewall configuration to prevent HTTP access can cause problems for integrations that use web services that support only HTTP to communicate with NNMi. See the documentation for the integrating product to determine whether it supports HTTPS.
For a less secure approach, redirect NNMi console access requests from the HTTP port to the HTTPS port by completing the following steps:
-
Edit the following file:
-
Windows: %NNM_PROPS%\nms-ui.properties
-
UNIX: $NNM_PROPS/nms-ui.properties
-
-
Search for the string https to locate the text block containing the following line:
#! com.hp.ov.nms.ui.https.only=false
-
Uncomment and edit this line to read as follows:
com.hp.ov.nms.ui.https.only=true
-
Restart NNMi:
ovstop ovstart
- Reference note
-
Setting this property to redirect HTTP requests to HTTPS for the NNMi console can cause problems with some applications that cross-launch back to NNMi. If you experience such problems, disable this HTTPS redirect.