User guide
28
Release Notes for Cisco Router and Security Device Manager 2.5
OL-5009-20
Caveats
Workaround: This may be addressed in a future release of Cisco IOS.
• CSCsh44720
When Cisco SDM installed on a PC is invoked in Internet Explorer 7.0 using either HTTP or
HTTPS, the popup window asking for the IP address of the router appears again after the IP address
has been entered in the first popup window.
When Cisco SDM installed on router flash memory nvoked in Internet Explorer 7.0 using HTTPS,
a certification error is displayed. Cisco SDM starts if you choose Continue to this website (not
recommended).
• CSCsg53496
Because of Cisco IOS caveat CSCsg63809, SSID configuration values entered in the Wireless
Security > Bridging/Routing window are not delivered to the router.
Workaround: This may be addressed in a future release of Cisco IOS.
• CSCsg36618
The Cisco SDM Wireless Application does not work on modular routers using wireless network
adaptors running Cisco IOS release 12.4(9)T1.
• CSCsg90956
If you use the Cisco SDM install wizard to install Cisco SDM on a router that is running Cisco IOS
12.4(12), or if the file management feature is used to place a .tar file on the router running Cisco
IOS 12.4(12), the operation may fail.
Workaround: The workaround for both problems is to manually copy the files from the PC to the
router using TFTP or FTP.
• CSCek38259
If the router is configured to allow Cisco SDM access through a SSL VPN gateway that listens on
the standard port 443, and that gateway is modified to listen on another custom port, the commands
that were added for Cisco SDM access are not automatically removed, and must be removed using
the Cisco IOS CLI. The SSL VPN gateway may have been configured using the SSL VPN wizard,
or it may have been configured manually and then modified to allow Cisco SDM access by adding
the commands described in Cisco SDM May not Launch Using IP Address of SSL VPN Gateway.
Workaround:
To safely edit the SSL VPN gateway to listen to a port other than 443, do the following:
–
Go to Configure > VPN > SSLVPN > Edit SSL VPN, select the gateway and click Edit.
–
Uncheck the Enable secure SDM access through IP address checkbox is checked, uncheck it,
and click OK to deliver the configuration change to the router.
–
Click Edit again and enter the port number that you want the SSL VPN gateway to use.
–
Remove the loopback interface that was created for Cisco SDM access by clicking Configure
> Interfaces and Connections > Edit Interfaces/Connections and removing the loopback
interface.
–
To remove the NAT rule, click Configure > NAT > Edit NAT Configuration, and remove the
NAT rule that was added. Do not remove the NAT rule if it is being used by other parts of the
configuration.
Cisco SDM can now be invoked using the standard HTTPS port 443.