Cisco Cisco IOS Software Release 12.2(55)SE

Page de 42
 
13
Release Notes for the Cisco IE 3000 Switch, Cisco IOS Release 12.2(55)SE and Later
OL-23061-05
  Important Notes
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
The device manager uses the HTTP protocol (the default is port 80) and the default method of 
authentication (the enable password) to communicate with the switch through any of its Ethernet 
ports and to allow switch management from a standard web browser. 
If you change the HTTP port, you must include the new port number when you enter the IP address 
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new 
HTTP port number). You should write down the port number through which you are connected. Use 
care when changing the switch IP information.
If you are not using the default method of authentication (the enable password), you need to 
configure the HTTP server interface with the method of authentication used on the switch.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {aaa | enable | 
local}
Configure the HTTP server interface for the type of authentication that 
you want to use.
aaa—Enable the authentication, authorization, and accounting feature. 
You must enter the aaa new-model interface configuration command 
for the aaa keyword to appear.
enable—Enable password, which is the default method of HTTP 
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access 
server, is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {enable | local | 
tacacs}
Configure the HTTP server interface for the type of authentication that 
you want to use.
enable—Enable password, which is the default method of HTTP 
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access 
server, is used.
tacacs—TACACS server is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.