Cisco Cisco IOS Software Release 12.2(55)SE

Seite von 88
 
38
Release Notes for the Catalyst 3750, 3560, 2975, 2960-S, and 2960 Switches, Cisco IOS Release 12.2(55)SE and Later
OL-23054-07
Open Caveats
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
The device manager uses the HTTP protocol (the default is port 80) and the default method of 
authentication (the enable password) to communicate with the switch through any of its Ethernet 
ports and to allow switch management from a standard web browser. 
If you change the HTTP port, you must include the new port number when you enter the IP address 
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new 
HTTP port number). You should write down the port number through which you are connected. Use 
care when changing the switch IP information.
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the 
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you 
cannot launch the device manager.
Open Caveats
Unless otherwise noted, these severity 3 Cisco IOS configuration caveats apply to the Catalyst 3750, 
3560, 2975, 2960-S and 2960 switches and to Cisco EtherSwitch service modules:
CSCur23656 (Catalyst Switch 2960-S, Catalyst Switch 3560, Catalyst Switch 3750)
Cisco IOS and Cisco IOS-XE (IOSd) include a version of SSL that is affected by the vulnerability 
identified by the Common Vulnerability and Exposures (CVE) IDs: CVE-2014-3566
There is no workaround. 
CSCte99366 
In a Smart Install network, when the director is connected between the client and the DHCP server 
and the server has options configured for image and configuration, then the client does not receive 
the image and configuration files sent by the DHCP server during an automatic upgrade. Instead the 
files are overwritten by the director and the client receives the image and configuration that the 
director sends. 
Use one of these workarounds: 
If client needs to upgrade using an image and configuration file configured in the DHCP server 
options, you should remove the client from the Smart Install network during the upgrade.
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {aaa | enable | 
local}
Configure the HTTP server interface for the type of authentication that 
you want to use.
aaa—Enable the authentication, authorization, and accounting feature. 
You must enter the aaa new-model interface configuration command 
for the aaa keyword to appear.
enable—Enable password, which is the default method of HTTP 
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access 
server, is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.