Cisco Cisco IOS Software Release 12.2(52)SE
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
13
Release Notes for the Cisco Catalyst Blade Switch 3030, Cisco IOS Release 12.2(52)SE
OL-19717-01
Open Caveats
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
•
The device manager uses the HTTP protocol (the default is port 80) and the default method of
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
If you change the HTTP port, you must include the new port number when you enter the IP address
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
•
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you
cannot start the device manager.
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you
cannot start the device manager.
Open Caveats
•
CSCsx29696
On switches running Cisco IOS Release 12.2(35)SE or later, connectivity issues might occur with
these messages:
these messages:
%SUPQ-4-CPUHB_RECV_STARVE: Still seeing receive queue stuck after throttling
There is no workaround.
•
CSCsy85676
When you configure an ACL and enter the access-group interface configuration command to apply
it to an interface for web authentication, the output from the show epm session ip-address or show
ip access_list interface interface-id privileged EXEC command does not show any web
authentication filter ID.
it to an interface for web authentication, the output from the show epm session ip-address or show
ip access_list interface interface-id privileged EXEC command does not show any web
authentication filter ID.
There is no workaround.
Command Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip http authentication {aaa | enable |
local}
local}
Configure the HTTP server interface for the type of authentication that
you want to use.
you want to use.
•
aaa—Enable the authentication, authorization, and accounting feature.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
•
enable—Enable password, which is the default method of HTTP
server user authentication, is used.
server user authentication, is used.
•
local—Local user database, as defined on the Cisco router or access
server, is used.
server, is used.
Step 3
end
Return to privileged EXEC mode.
Step 4
show running-config
Verify your entries.