Cisco Cisco IOS Software Release 12.2(35)SE

Page de 56
 
32
Release Notes for the Catalyst 3750, 3560, 2970, and 2960 Switches, Cisco IOS Release 12.2(37)SE and Later
OL-12631-02
Open Caveats
The device manager uses the HTTP protocol (the default is port 80) and the default method of 
authentication (the enable password) to communicate with the switch through any of its Ethernet 
ports and to allow switch management from a standard web browser. 
If you change the HTTP port, you must include the new port number when you enter the IP address 
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new 
HTTP port number). You should write down the port number through which you are connected. Use 
care when changing the switch IP information.
If you are not using the default method of authentication (the enable password), you need to 
configure the HTTP server interface with the method of authentication used on the switch.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the 
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you 
cannot launch the device manager.
Open Caveats
This section describes the open caveats with possible unexpected activity in this software release. Unless 
otherwise noted, these severity 3 Cisco IOS configuration caveats apply to the Catalyst 3750, 3560, 
2970, and 2960 switches and to Cisco EtherSwitch service modules:
CSCef84975 (Cisco EtherSwitch service modules)
Phone detection events that are generated by many IEEE phones connected to the switch ports can 
consume a significant amount of CPU time if the switch ports cannot power the phones because the 
internal link is down.
The workaround is to enter the power inline never interface configuration command on all the Fast 
Ethernet ports that are not powered by but are connected to IP phones if the problem persists.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.
Command Purpose
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {enable | local | 
tacacs}
Configure the HTTP server interface for the type of authentication that 
you want to use.
enable—Enable password, which is the default method of HTTP 
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access 
server, is used.
tacacs—TACACS server is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.