HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 13

Open Caveats, Open Cisco IOS Caveats

Page 13 highlights

Open Caveats Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface: Step 1 Step 2 Step 3 Step 4 Command configure terminal ip http authentication {enable | local | tacacs} end show running-config Purpose Enter global configuration mode. Configure the HTTP server interface for the type of authentication that you want to use. • enable-Enable password, which is the default method of HTTP server user authentication, is used. • local-Local user database, as defined on the Cisco router or access server, is used. • tacacs-TACACS server is used. Return to privileged EXEC mode. Verify your entries. • If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you cannot launch the device manager. Open Caveats This section describes the open severity 3 caveats for this software release. Open Cisco IOS Caveats This section describes the open severity 3 Cisco IOS configuration caveats with possible unexpected activity in this software release: • CSCei63394 When an IEEE 802.1x restricted VLAN is configured on a port and a hub with multiple devices are connected to that port, syslog messages are now generated. This is not a supported configuration. Only one host should be connected to an IEEE 802.1x restricted VLAN port. • CSCsb11849 When the Control Plane Policing (CoPP) policy is configured to drop packets that have IP options, packets with incorrectly created IP options are ignored. The workaround is to configure CoPP to filter IP packets by source or destination address and not use the IP option for ACL filtering with CoPP. • CSCsb85001 If traffic is passing through VMPS ports and you perform a shut operation, a dynamic VLAN is not assigned and a VLAN with a null ID appears. The workaround is to clear the MAC address table. This forces the VMPS server to correctly reassign the VLAN. OL-12577-03 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(37)SE and Later 13

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22

13
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(37)SE and Later
OL-12577-03
Open Caveats
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example,
www
.
cisco.com:84
), you must enter
http://
as the URL prefix. Otherwise, you
cannot launch the device manager.
Open Caveats
This section describes the open severity 3 caveats for this software release.
Open Cisco IOS Caveats
This section describes the open severity 3 Cisco IOS configuration caveats with possible unexpected
activity in this software release:
CSCei63394
When an IEEE 802.1x restricted VLAN is configured on a port and a hub with multiple devices are
connected to that port, syslog messages are now generated.
This is not a supported configuration. Only one host should be connected to an IEEE 802.1x
restricted VLAN port.
CSCsb11849
When the Control Plane Policing (CoPP) policy is configured to drop packets that have IP options,
packets with incorrectly created IP options are ignored.
The workaround is to configure CoPP to filter IP packets by source or destination address and not
use the IP option for ACL filtering with CoPP.
CSCsb85001
If traffic is passing through VMPS ports and you perform a
shut
operation, a dynamic VLAN is not
assigned and a VLAN with a null ID appears.
The workaround is to clear the MAC address table. This forces the VMPS server to correctly
reassign the VLAN.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication
{
enable
|
local
|
tacacs
}
Configure the HTTP server interface for the type of authentication that
you want to use.
enable
—Enable password, which is the default method of HTTP
server user authentication, is used.
local
—Local user database, as defined on the Cisco router or access
server, is used.
tacacs
—TACACS server is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.