Management Access Error Messages; Sdm Warning: Any Not Allowed - Cisco OL-4015-08 User Manual

Cisco router and security device manager user's guide
Table of Contents

Advertisement

VTYs
Management Protocols
Note

Management Access Error Messages

SDM Warning: ANY Not Allowed

Cisco Router and Security Device Manager Version 2.2 User's Guide
23-18
Specify the management protocols allowed for the host or network.
Allow SDM
Check to allow the specified host or network to access SDM. When you check this
box, the following protocols are automatically checked: Telnet, SSH, HTTP,
HTTPS, and RCP. Checking this option does not prevent you from allowing
additional protocols.
If you want to make users employ secure protocols when logging on to SDM,
check Allow secure protocols only. When you check this box, the following
protocols are automatically checked: SSH, HTTPS, RCP. If you then check a
non-secure protocol, such as Telnet, SDM will uncheck Allow secure protocols
only.
You can specify management protocols individually
If you want to specify individual protocols that the host or network can use, you
can check any of the boxes: Telnet, SSH,
SNMP.
If Telnet and SSH are not enabled (checked) in the VTYs window, and SNMP is
not enabled in the SNMP Properties window, SDM will advise you to enable those
protocols when they are selected in this window.
The options Allow secure protocols only, and HTTPS will be disabled if the
router's Cisco IOS image does not support HTTPS.
The following error messages may be generated by the Management Access
feature.
A management policy will be read only if the source or destination in any of this
policy's rule entries now contains the keyword "any." Such policies cannot be
edited in the Management Access window. A policy containing the "any" keyword
Chapter 23
HTTP,
HTTPS,
HTTP,
Router Properties
HTTPS, RCP, or
OL-4015-08

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents