[Last Call] Learn about multicloud storage options and how to improve your company's cloud strategy. Register Now

x
?
Solved

Browser not authentication capable

Posted on 2006-10-30
3
Medium Priority
?
3,949 Views
Last Modified: 2012-05-05
I'm trying to set up PDM on our PIX 525.  I configured all of the http commands, and when I try to hit the ip of the pix it asks for my authentication.  I use no username, and the enable password.  It doesn't work, and I get booted out to a webpage that says the following "Browser not authentication capable or authentication failed".

any ideas?

Thanks!
Scott
0
Comment
Question by:scottman29
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 3

Accepted Solution

by:
mahe2000 earned 1000 total points
ID: 17835023
try creating a user to access the pix.
username <user> password <password> privilege 15
0
 
LVL 5

Author Comment

by:scottman29
ID: 17835193
I did this, and then also added the aaa authentication http console local command...

was that correct to do?
0
 
LVL 3

Expert Comment

by:mahe2000
ID: 17835226
yes sir..... :)
0

Featured Post

Looking for the Wi-Fi vendor that's right for you?

We know how difficult it can be to evaluate Wi-Fi vendors, so we created this helpful Wi-Fi Buyer's Guide to help you find the Wi-Fi vendor that's right for your business! Download the guide and get started on our checklist today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

650 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question