Cisco Cisco IOS Software Release 12.2(55)SE
38
Release Notes for the Catalyst 3750, 3560, 2975, 2960-S, and 2960 Switches, Cisco IOS Release 12.2(55)SE and Later
OL-23054-07
Open Caveats
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
The device manager uses the HTTP protocol (the default is port 80) and the default method of
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
If you change the HTTP port, you must include the new port number when you enter the IP address
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
•
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you
cannot launch the device manager.
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you
cannot launch the device manager.
Open Caveats
Unless otherwise noted, these severity 3 Cisco IOS configuration caveats apply to the Catalyst 3750,
3560, 2975, 2960-S and 2960 switches and to Cisco EtherSwitch service modules:
3560, 2975, 2960-S and 2960 switches and to Cisco EtherSwitch service modules:
•
CSCur23656 (Catalyst Switch 2960-S, Catalyst Switch 3560, Catalyst Switch 3750)
Cisco IOS and Cisco IOS-XE (IOSd) include a version of SSL that is affected by the vulnerability
identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-3566
identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-3566
There is no workaround.
•
CSCte99366
In a Smart Install network, when the director is connected between the client and the DHCP server
and the server has options configured for image and configuration, then the client does not receive
the image and configuration files sent by the DHCP server during an automatic upgrade. Instead the
files are overwritten by the director and the client receives the image and configuration that the
director sends.
and the server has options configured for image and configuration, then the client does not receive
the image and configuration files sent by the DHCP server during an automatic upgrade. Instead the
files are overwritten by the director and the client receives the image and configuration that the
director sends.
Use one of these workarounds:
–
If client needs to upgrade using an image and configuration file configured in the DHCP server
options, you should remove the client from the Smart Install network during the upgrade.
options, you should remove the client from the Smart Install network during the upgrade.
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {aaa | enable |
local}
local}
Configure the HTTP server interface for the type of authentication that
you want to use.
you want to use.
•
aaa—Enable the authentication, authorization, and accounting feature.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
•
enable—Enable password, which is the default method of HTTP
server user authentication, is used.
server user authentication, is used.
•
local—Local user database, as defined on the Cisco router or access
server, is used.
server, is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.