HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 13

Open Caveats, Device Manager, Cisco IOS

Page 13 highlights

Open Caveats • If you are not using the default method of authentication (the enable password), you need to configure the HTTP server interface with the method of authentication used on the switch. Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface: Step 1 Step 2 Command configure terminal ip http authentication {aaa | enable | local} Step 3 end Step 4 show running-config Purpose Enter global configuration mode. Configure the HTTP server interface for the type of authentication that you want to use. • aaa-Enable the authentication, authorization, and accounting feature. You must enter the aaa new-model interface configuration command for the aaa keyword to appear. • enable-Enable password, which is the default method of HTTP server user authentication, is used. • local-Local user database, as defined on the Cisco router or access server, is used. Return to privileged EXEC mode. Verify your entries. • The device manager uses the HTTP protocol (the default is port 80) and the default method of authentication (the enable password) to communicate with the switch through any of its Ethernet ports and to allow switch management from a standard web browser. If you change the HTTP port, you must include the new port number when you enter the IP address in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new HTTP port number). You should write down the port number through which you are connected. Use care when changing the switch IP information. • If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you cannot start the device manager. Open Caveats Device Manager • CSCtf57222. The chassis ID for the CBS3020 does not appear in the Device Manager window. There is no workaround. Cisco IOS • CSCtf57222 When you use the device manager, the dashboard does not display the switch chassis ID. There is no workaround. OL-22861-04 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34

13
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later
OL-22861-04
Open Caveats
If you are
not
using the default method of authentication (the enable password), you need to
configure the HTTP server interface with the method of authentication used on the switch.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
The device manager uses the HTTP protocol (the default is port 80) and the default method of
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
If you change the HTTP port, you must include the new port number when you enter the IP address
in the browser
Location
or
Address
field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example,
www
.
cisco.com:84
), you must enter
http://
as the URL prefix. Otherwise, you
cannot start the device manager.
Open Caveats
Device Manager
CSCtf57222.
The chassis ID for the CBS3020 does not appear in the Device Manager window.
There is no workaround.
Cisco IOS
CSCtf57222
When you use the device manager, the dashboard does not display the switch chassis ID.
There is no workaround.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication
{
aaa | enable
|
local
}
Configure the HTTP server interface for the type of authentication that
you want to use.
aaa
—Enable the authentication, authorization, and accounting feature.
You must enter the
aaa new-model
interface configuration command
for the
aaa
keyword to appear.
enable
—Enable password, which is the default method of HTTP
server user authentication, is used.
local
—Local user database, as defined on the Cisco router or access
server, is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.