It is not possible (as far as I know) to restict access to the web interface on a Cisco router or Catalyst switch on the basis of interface.
The best you can do is to limit access to particular source networks or hosts using a standard access-list.
Here is an example:
ip access-list standard 10
remark Restrict access to HTTP/s service
permit 10.0.0.0 0.255.255.255
permit host 192.168.100.10
deny any
ip http access-list 10
ip http server
This will only permit hosts on network 10.0.0.0/8 and host 192.168.100.10 to connect to the HTTP server on this router.