Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(46)SE
12
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(46)SE
501396-001
Important Notes
Cisco IOS Notes
These notes apply to Cisco IOS software:
• Cisco IOS Release 12.2(40)SE and later
If the switch has interfaces with automatic QoS for voice over IP (VoIP) configured and you upgrade
the switch software to Cisco IOS Release 12.2(40)SE (or later), when you enter the auto qos voip
cisco-phone interface configuration command on another interface, you might see this message:
AutoQoS Error: ciscophone input service policy was not properly applied
policy map AutoQoS-Police-CiscoPhone not configured
If this happens, enter the no auto qos voip cisco-phone interface command on all interface with this
configuration to delete it. Then enter the auto qos voip cisco-phone command on each of these
interfaces to reapply the configuration.
Device Manager Notes
These notes apply to the device manager:
• We recommend that you use this browser setting to display the device manager from Microsoft Internet
Explorer in the least amount of time.
From Microsoft Internet Explorer:
1. Choose Tool s > Internet Options.
2. Click Settings in the “Temporary Internet files” area.
3. From the Settings window, choose Automatically.
4. Click OK.
5. Click OK to exit the Internet Options window.
• The HTTP server interface must be enabled to display the device manager. By default, the HTTP
server is enabled on the switch. Use the show running-config privileged EXEC command to see if
the HTTP server is enabled or disabled.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip http authentication {enable | local |
tacacs}
Configure the HTTP server interface for the type of authentication that
you want to use.
• enable—Enable password, which is the default method of HTTP
server user authentication, is used.
• local—Local user database, as defined on the Cisco router or access
server, is used.
• tacacs—TACACS server is used.
Step 3
end Return to privileged EXEC mode.
Step 4
show running-config Verify your entries.