cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
434
Views
0
Helpful
14
Replies

webui is text only on c3560

dpapkin
Level 1
Level 1

Hi,

 

When I use a Chrome or Edge browser and goto the IP of my switch , the webui is only text

 

I have configured it

 

username admin privilege 15 secret 9 (xxx) interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
ip default-gateway 192.168.1.1
ip forward-protocol nd
!
ip http server
ip http banner
ip http authentication local
ip http secure-server

 

 

Here is a DIR 

dpapkin_0-1726201629065.pngdpapkin_1-1726201664200.png

 

 

 

1 Accepted Solution

Accepted Solutions

Hi,

Thanks for the reply. Can you please configure:

ip http path flash:/c3560cx-universalk9-mz.152-4.E6/html

and try again.

Please note: path edited

Best regards,

Antonin

 

View solution in original post

14 Replies 14

amikat
Level 7
Level 7

Hi,

Can you please post the output when issuing the "sh ip http server status" command.

Also the HTTP server authentication method is "enable" by default. Have you configured enable password/secret?

Thanks & Regards,

Antonin

Switch>en
Switch#sh ip http server status
HTTP server status: Enabled
HTTP server port: 80
HTTP server authentication method: local
HTTP server access class: 0
HTTP server base path: flash:html
HTTP server help root:
Maximum number of concurrent server connections allowed: 16
Maximum number of secondary server connections allowed: 5
Server idle time-out: 180 seconds
Server life time-out: 180 seconds
Server session idle time-out: 180 seconds
Maximum number of requests allowed on a connection: 25
HTTP server active session modules: ALL
HTTP secure server capability: Present
HTTP secure server status: Enabled
HTTP secure server port: 443
HTTP secure server ciphersuite: aes-128-cbc-sha aes-256-cbc-sha
dhe-aes-128-cbc-sha edche-rsa-aes-256-cbc-sha rsa-aes-cbc-sha2
rsa-aes-gcm-sha2 dhe-aes-cbc-sha2 dhe-aes-gcm-sha2
ecdhe-rsa-aes-cbc-sha2 ecdhe-rsa-aes-gcm-sha2
HTTP secure server TLS version: TLSv1.2 TLSv1.1
HTTP secure server client authentication: Disabled
HTTP secure server trustpoint:
HTTP secure server active session modules: ALL

yes, done Enable Secret

DP

Hi,

Thanks for the reply. Can you please configure:

ip http path flash:/c3560cx-universalk9-mz.152-4.E6/html

and try again.

Please note: path edited

Best regards,

Antonin

 

Hi,

[image: image.png]
[image: image.png]

Hi,

Thanks for the feedback. The html system for these two IOS versions is clearly inconsistent. Provided you have no access to the IOS 15.2(7)E9 tar file and need webui access the other option may be to run 15.2(4)E6 IOS version for which you have both .bin and html files in flash.

Best regards,

Antonin

i managed to connect and m trying to upgrade to later firmware and it is
stuck on the upload.

The wheel keeps spinning

Any suggestions?

thanks

[image: image.png]

Hi,

Thanks for the message. I am not sure I understand what your current situation is. Are you trying to download the new IOS and this download gets stucked or are you trying webgui and that is stucked. Can you please clarify.

Thanks & Regards,

Antonin

Hi,

It appears that this switch has different .bin file version and .tar file
version.

I am unable to find c3560cx-universalk9-mz.152-7.E9..tar on Cisco downloads

I am trying to upgrade it now but after downloading later version and
uploading to switch with tftp, get verification error when trying to boot
from it with boot system flash: c3560c405-universalk9-mz.152-2.E10.bin

c3560cx-universalk9-mz.152-7.E9.bin

Switch#dir c3560c405-universalk9-mz.152-2.E9/html
Directory of flash:c3560c405-universalk9-mz.152-2.E9/html/

1131 -rwx 3500 Sep 13 2024 17:00:20 +00:00 ip.js
1132 -rwx 39650 Sep 13 2024 17:00:22 +00:00 graph.js
1133 -rwx 144038 Sep 13 2024 17:00:31 +00:00 smartports.js
1134 -rwx 139989 Sep 13 2024 17:01:03 +00:00 dashboard.shtml
1135 -rwx 577 Sep 13 2024 17:01:33 +00:00 title.js

[image: image.png]



I am trying to upgrade it now but after downloading later version and
uploading to switch with tftp, get verification error when trying to boot
from it with boot system flash: c3560c405-universalk9-mz.152-2.E10.bin



Switch#dir
Directory of flash:/

2 -rwx 19833856 Sep 13 2024 14:03:03 +00:00
c3560c405-universalk9-mz.152-2.E10.bin
3 -rwx 22968320 Jan 10 2024 11:17:38 +00:00
c3560cx-universalk9-mz.152-7.E9.bin
4 drwx 512 Jan 10 2024 11:33:23 +00:00 pnp-info
5 -rwx 3403 Sep 13 2024 16:17:13 +00:00 private-config.text
6 drwx 512 Nov 9 2018 07:43:52 +00:00
c3560cx-universalk9-mz.152-4.E6
577 drwx 512 Nov 9 2018 07:43:52 +00:00 dc_profile_dir
579 drwx 512 May 10 2024 02:14:02 +00:00 pnp-tech
582 drwx 512 Sep 13 2024 15:15:20 +00:00
c3560c405-universalk9-mz.152-2.E10
1671 -rwx 4120 Sep 13 2024 16:24:12 +00:00 multiple-fs
1125 -rwx 2375 Sep 13 2024 16:17:12 +00:00 config.text
1126 drwx 512 Sep 13 2024 14:34:25 +00:00
c3560c405-universalk9-mz.152-2.E9
1669 -rwx 112 Sep 13 2024 17:24:11 +00:00 info

122185728 bytes total (1750528 bytes free)

Switch#show ip http server status
HTTP server status: Enabled
HTTP server port: 80
HTTP server authentication method: local
HTTP server access class: 0
HTTP server base path: flash:/c3560c405-universalk9-mz.152-2.E9/html
HTTP server help root:
Maximum number of concurrent server connections allowed: 16
Maximum number of secondary server connections allowed: 5
Server idle time-out: 180 seconds
Server life time-out: 180 seconds
Server session idle time-out: 180 seconds
Maximum number of requests allowed on a connection: 25
HTTP server active session modules: ALL
HTTP secure server capability: Present
HTTP secure server status: Enabled
HTTP secure server port: 443
HTTP secure server ciphersuite: aes-128-cbc-sha aes-256-cbc-sha
dhe-aes-128-cbc-sha edche-rsa-aes-256-cbc-sha rsa-aes-cbc-sha2
rsa-aes-gcm-sha2 dhe-aes-cbc-sha2 dhe-aes-gcm-sha2
ecdhe-rsa-aes-cbc-sha2 ecdhe-rsa-aes-gcm-sha2
HTTP secure server TLS version: TLSv1.2 TLSv1.1
HTTP secure server client authentication: Disabled
HTTP secure server trustpoint:
HTTP secure server active session modules: ALL

username admin privilege 15 secret 9 (xxxx)
no aaa new-model
system mtu routing 1500
!
!
!
!
ip routing

crypto pki trustpoint TP-self-signed-2810962304
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2810962304
revocation-check none
rsakeypair TP-self-signed-2810962304
!
!
crypto pki certificate chain TP-self-signed-2810962304
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32383130 39363233 3034301E 170D3234 30393130 30363137
34325A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 38313039
36323330 3430819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100917D 61CD9908 136B9A83 F6EC5E7F 5835023D 2FC619C2 F19FC490 75109A9A
D17E0FFC B077A103 0CC789C3 8BE968F4 BB69F9DA 9F93BE54 C81375BC 01F62206
25397CF5 BB729686 CC3E8603 0250BED6 1DD8F310 64E32475 C7E9DC4C 12FF76B5
2CDF7CCA E415A63B 601C19A2 517AFBF3 34C38BC7 31B22A9A 4B2C9B9B D0F93021
50FB0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14737EE5 44718ECB 1C25D41C 2E492BB5 D2E52D8B 02301D06
03551D0E 04160414 737EE544 718ECB1C 25D41C2E 492BB5D2 E52D8B02 300D0609
2A864886 F70D0101 05050003 8181001C D7A43A90 3120816D DBBE6B40 A4A3747A
D3DA9FAD 35B89A58 B80BB8C0 949328D2 950C9468 C881A0BC 90F9DDD9 70964ADE
38F35016 B81525A4 E50214D4 889B6B89 F7CE838B C78C83C8 290A07A8 6D92949D
23F2E2A3 1F619A4A 3968B673 7C3605E2 FF266EE5 11257135 7A1F9DDA 1CFA71B4
11104B08 4E163854 877A5705 85DCE2
quit
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
!
!
!
vlan internal allocation policy ascending

interface Vlan1
ip address 192.168.1.1 255.255.255.0
!
ip default-gateway 192.168.1.1
ip forward-protocol nd
!
ip http server
ip http banner
ip http authentication local
ip http secure-server
ip http path flash:/c3560c405-universalk9-mz.152-2.E9/html
!
!
logging trap debugging
!
!
!
line con 0
line vty 0 4
login
transport input ssh
line vty 5 15
login
transport input ssh
!
!



Hi,

It appears that you have downloaded the IOS version designated for the Cat3560-C series not suitable for your box which is of Cat3560-CX series. Your image name should start with c3560cx-universalk9... NOT c3560c405-universalk9... Can you please retry.

Best regards,

Antonin

Hi,

In addition to my previuos response I would like to remind you that before you start to put the new IOS version into the flash via the "archive download-sw" command you should remove the ip http path you have configured ("no ip http path" command) as the new html files will be placed obviously in another directory (the path should be set automatically during the tar unpack).

Good Luck!

Best regards,

Antonin

Leo Laohoo
Hall of Fame
Hall of Fame

@dpapkin wrote:
When I use a Chrome or Edge browser and goto the IP of my switch , the webui is only text

I do not see anything wrong. 

This is the usual behaviour when someone "upgrades" the switch IOS by simply copy-the-bin-file to the switch. 

Look at the date stamps.  The IOS BIN file, 15.2(7)E9, was copied on 10 January 2024, however, the HTML files are meant for 15.2(4)E6 with a date stamp of 09 November 2018.  

Hi,

Thanks for the prompt reply.

How to fix this ?

thanks

DP

Re-do the IOS upgrade and do it correctly:

1.  Download the TAR file 

2.  Store the TAR file in a TFTP server

3.  Use the following command:  archive download-sw /over tftp://<ip address>/filename.tar

Hi,

This is a used switch that I inherited.

I dont have access to cisco software downloads

What can I do to fix this mismatch?

Thanks!

DP
Review Cisco Networking for a $25 gift card