cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1649
Views
0
Helpful
4
Replies

2950 Switch access to Device Manger

cloudpunch
Level 1
Level 1

I have several Cisco 2950 switches recently updated to IOS 12.1(22)EA13 and am unable to access the web-based device manager on any of them.

1. The Device Manager is installed on the switches from the tar file.
2. The switches are configured with an ip address on the management vlan as well as a default gateway.
3. The switches are configured as an http server.
4. I can successfully ping the switches as well as around my network from the switches.

Any help would be greatly appreciated!

Thanks!

1 Accepted Solution

Accepted Solutions

Hi,

Take a look at the release notes (below) to see any of these restriction applies to you devices

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp999842

Also take a look at the resolved caveats section:

Both the Cisco IOS HTTP server and the Cisco IOS HTTPS server use the locally configured enable password (configured by using the enable password or enable secretcommands) as the default authentication mechanism for any request received. Other mechanisms can also be configured to authenticate requests to the HTTP or HTTPS interface. Some of those mechanisms are the local user database, an external RADIUS server or an external TACACS+ server.

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp1000202

HTH

Reza

View solution in original post

4 Replies 4

Reza Sharifi
Hall of Fame
Hall of Fame

Hi,

Can you post the IOS name you downloaded?

Reza

Reza, it was c2950-i6k2l2q4-tar.121-22.EA13.tar

Thanks!

Hi,

Take a look at the release notes (below) to see any of these restriction applies to you devices

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp999842

Also take a look at the resolved caveats section:

Both the Cisco IOS HTTP server and the Cisco IOS HTTPS server use the locally configured enable password (configured by using the enable password or enable secretcommands) as the default authentication mechanism for any request received. Other mechanisms can also be configured to authenticate requests to the HTTP or HTTPS interface. Some of those mechanisms are the local user database, an external RADIUS server or an external TACACS+ server.

http://www.cisco.com/en/US/docs/switches/lan/catalyst2950/software/release/12.1_22_ea13/release/notes/OL16966.html#wp1000202

HTH

Reza

Reza,

I'm ashamed to say that I had already seen most of that, including the password info (which I had for some reason chosen to ignore).  The password was indeed my problem.

Thank you for gracefully pointing out the error of my ways. :-)

Review Cisco Networking products for a $25 gift card