HP Cisco Catalyst Blade Switch 3020 Cisco Gigabit Ethernet Switch Module for H - Page 13

VLAN Interfaces and MAC Addresses, Documentation Notes

Page 13 highlights

VLAN Interfaces and MAC Addresses Step 1 Step 2 Step 3 Step 4 Command configure terminal ip http authentication {enable | local | tacacs} end show running-config Purpose Enter global configuration mode. Configure the HTTP server interface for the type of authentication that you want to use. • enable-Enable password, which is the default method of HTTP server user authentication, is used. • local-Local user database, as defined on the Cisco router or access server, is used. • tacacs-TACACS server is used. Return to privileged EXEC mode. Verify your entries. • If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you cannot launch the device manager. VLAN Interfaces and MAC Addresses All VLAN interfaces have assigned MAC addresses that are derived from the base MAC address. The base MAC address is the hardware address that is on the switch label. It also appears when you enter the show version privileged EXEC command. On the first VLAN interface (VLAN 1), the MAC address is the base MAC address + 0 x 40. On the next VLAN interface that you configure, the MAC address is the base MAC address + 0 x 40 +1, and so on for other VLAN interfaces. You can enter the show interfaces vlan vlan-id privileged EXEC command to show the MAC and IP addresses. The MAC addresses that appear in the show interfaces vlan vlan-id command output are not the same as the MAC address that is printed on the switch label (the base MAC address). By default, VLAN 1 is the interface that connects to the management network. When the switch boots up, the DHCP client (switch) requests an IP address from a DHCP server by using the MAC address of VLAN 1. Documentation Notes This section describes documentation notes related to this IOS release. Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later 464831-005 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

13
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
VLAN Interfaces and MAC Addresses
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example,
www
.
cisco.com:84
), you must enter
http://
as the URL prefix. Otherwise, you
cannot launch the device manager.
VLAN Interfaces and MAC Addresses
All VLAN interfaces have assigned MAC addresses that are derived from the base MAC address. The
base MAC address is the hardware address that is on the switch label. It also appears when you enter the
show version
privileged EXEC command.
On the first VLAN interface (VLAN 1), the MAC address is the base MAC address + 0 x 40. On the next
VLAN interface that you configure, the MAC address is the base MAC address + 0 x 40 +1, and so on
for other VLAN interfaces.
You can enter the
show interfaces vlan vlan-id
privileged EXEC command to show the MAC and
IP addresses. The MAC addresses that appear in the
show interfaces vlan vlan-id
command output are
not the same as the MAC address that is printed on the switch label (the base MAC address).
By default, VLAN 1 is the interface that connects to the management network. When the switch boots
up, the DHCP client (switch) requests an IP address from a DHCP server by using the MAC address of
VLAN 1.
Documentation Notes
This section describes documentation notes related to this IOS release.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication
{
enable
|
local
|
tacacs
}
Configure the HTTP server interface for the type of authentication that
you want to use.
enable
—Enable password, which is the default method of HTTP
server user authentication, is used.
local
—Local user database, as defined on the Cisco router or access
server, is used.
tacacs
—TACACS server is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.