Cisco 3020 - Cisco Catalyst Blade Switch Nota de lançamento - Página 12

Procurar online ou descarregar pdf Nota de lançamento para Interruptor Cisco 3020 - Cisco Catalyst Blade Switch. Cisco 3020 - Cisco Catalyst Blade Switch 41 páginas. Release notes for the cisco catalyst blade switch 3020 for hp, ciscoã‚â iosã‚â releaseã‚â 12.2(44)se
Também para Cisco 3020 - Cisco Catalyst Blade Switch: Manual de iniciação (37 páginas), Manual de iniciação (31 páginas), Especificação rápida (12 páginas), Nota de lançamento (27 páginas), Nota de lançamento (23 páginas), Nota de lançamento (21 páginas), Manual de instalação (21 páginas)

Cisco 3020 - Cisco Catalyst Blade Switch Nota de lançamento
Important Notes
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Command
Step 1
configure terminal
Step 2
ip http authentication {aaa | enable |
local}
Step 3
end
Step 4
show running-config
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Command
Step 1
configure terminal
Step 2
ip http authentication {enable | local |
tacacs}
Step 3
end
Step 4
show running-config
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(35)SE and Later
12
Purpose
Enter global configuration mode.
Configure the HTTP server interface for the type of authentication that
you want to use.
Return to privileged EXEC mode.
Verify your entries.
The device manager uses the HTTP protocol (the default is port 80) and the default method of
authentication (the enable password) to communicate with the switch through any of its Ethernet
ports and to allow switch management from a standard web browser.
If you change the HTTP port, you must include the new port number when you enter the IP address
in the browser Location or Address field (for example, http://10.1.126.45:184 where 184 is the new
HTTP port number). You should write down the port number through which you are connected. Use
care when changing the switch IP information.
If you are not using the default method of authentication (the enable password), you need to
configure the HTTP server interface with the method of authentication used on the switch.
Purpose
Enter global configuration mode.
Configure the HTTP server interface for the type of authentication that
you want to use.
Return to privileged EXEC mode.
Verify your entries.
If you use Internet Explorer Version 5.5 and select a URL with a nonstandard port at the end of the
address (for example, www.cisco.com:84), you must enter http:// as the URL prefix. Otherwise, you
cannot launch the device manager.
aaa—Enable the authentication, authorization, and accounting feature.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
enable—Enable password, which is the default method of HTTP
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access
server, is used.
enable—Enable password, which is the default method of HTTP
server user authentication, is used.
local—Local user database, as defined on the Cisco router or access
server, is used.
tacacs—TACACS server is used.
OL-8918-03