Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(46)SE
17
Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(46)SE
OL-16968-01
Important Notes
• If the switch has interfaces with automatic QoS for voice over IP (VoIP) configured and you upgrade
the switch software to Cisco IOS Release 12.2(40)EX1 or later, when you enter the auto qos voip
cisco-phone interface configuration command on another interface, you might see this message:
AutoQoS Error: ciscophone input service policy was not properly applied
policy map AutoQoS-Police-CiscoPhone not configured
If this happens, enter the no auto qos voip cisco-phone interface command on all interfaces with
this configuration to delete it. Then enter the auto qos voip cisco-phone command on each of these
interfaces to reapply the configuration.
Device Manager Notes
These notes apply to the device manager:
• You cannot create and manage switch clusters through the device manager. To create and manage
switch clusters, use the CLI or Cisco Network Assistant.
• We recommend this browser setting to reduce the time needed to display the device manager from
Microsoft Internet Explorer.
From Microsoft Internet Explorer:
1. Choose Tool s > Internet Options.
2. Click Settings in the “Temporary Internet files” area.
3. From the Settings window, choose Automatically.
4. Click OK.
5. Click OK to exit the Internet Options window.
• The HTTP server interface must be enabled to display the device manager. By default, the HTTP
server is enabled on the switch. Use the show running-config privileged EXEC command to see if
the HTTP server is enabled or disabled.
Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
ip http authentication {aaa | enable |
local}
Configure the HTTP server interface for the type of authentication that
you want to use.
• aaa—Enable the authentication, authorization, and accounting feature.
You must enter the aaa new-model interface configuration command
for the aaa keyword to appear.
• enable—Enable password, which is the default method of HTTP
server user authentication, is used.
• local—Local user database, as defined on the Cisco router or access
server, is used.
Step 3
end Return to privileged EXEC mode.
Step 4
show running-config Verify your entries.










