2950 Switch access to Device Manger

Answered Question
Mar 4th, 2010
User Badges:

I have several Cisco 2950 switches recently updated to IOS 12.1(22)EA13 and am unable to access the web-based device manager on any of them.


1. The Device Manager is installed on the switches from the tar file.
2. The switches are configured with an ip address on the management vlan as well as a default gateway.
3. The switches are configured as an http server.
4. I can successfully ping the switches as well as around my network from the switches.


Any help would be greatly appreciated!


Thanks!

Correct Answer by Reza Sharifi about 7 years 3 months ago

Hi,


Take a look at the release notes (below) to see any of these restriction applies to you devices


http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp999842


Also take a look at the resolved caveats section:


Both the Cisco IOS HTTP server and the Cisco IOS HTTPS server use the locally configured enable password (configured by using the enable password or enable secretcommands) as the default authentication mechanism for any request received. Other mechanisms can also be configured to authenticate requests to the HTTP or HTTPS interface. Some of those mechanisms are the local user database, an external RADIUS server or an external TACACS+ server.


http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp1000202


HTH

Reza

  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 5 (1 ratings)
Loading.
Reza Sharifi Thu, 03/04/2010 - 17:45
User Badges:
  • Super Bronze, 10000 points or more
  • Cisco Designated VIP,

    2017 LAN

Hi,


Can you post the IOS name you downloaded?


Reza

cloudpunch Thu, 03/04/2010 - 17:50
User Badges:

Reza, it was c2950-i6k2l2q4-tar.121-22.EA13.tar


Thanks!

Correct Answer
Reza Sharifi Thu, 03/04/2010 - 18:21
User Badges:
  • Super Bronze, 10000 points or more
  • Cisco Designated VIP,

    2017 LAN

Hi,


Take a look at the release notes (below) to see any of these restriction applies to you devices


http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp999842


Also take a look at the resolved caveats section:


Both the Cisco IOS HTTP server and the Cisco IOS HTTPS server use the locally configured enable password (configured by using the enable password or enable secretcommands) as the default authentication mechanism for any request received. Other mechanisms can also be configured to authenticate requests to the HTTP or HTTPS interface. Some of those mechanisms are the local user database, an external RADIUS server or an external TACACS+ server.


http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp1000202


HTH

Reza

cloudpunch Thu, 03/04/2010 - 22:13
User Badges:

Reza,


I'm ashamed to say that I had already seen most of that, including the password info (which I had for some reason chosen to ignore).  The password was indeed my problem.


Thank you for gracefully pointing out the error of my ways. :-)

Actions

This Discussion

Related Content