cisco switch WS-C3850-24T & Cisco Network Assistant ver 6.2

my cisco WS-C3850-24T and Cisco Network Assistant ver 6.2 connected with read/write access "run CAN 6.2 as administrator
" to cisco WS-C3850-24T but cannot add vlan and configuration using CNA 6.2 but when i using command by telnet it apply

Please note I can change hostname by CNA 2.6

Thanks
AlkannetworksAsked:
Who is Participating?
 
Craig BeckConnect With a Mentor Commented:
Just use login local then.
0
 
Steven RomanCommented:
It is way quicker and cleaner to just use the CLI.   The CNA may lose connection once in a while and you will not see the correct data and have to constantly refresh.

It also seems quick a few people have this same issue with CNA.  I find it way cleaner and quicker to just hit the CLI and have it done cleanly.

Especially if multiple people are working on the devices.

Hope this helps.

Thanks
0
 
AlkannetworksAuthor Commented:
Ok , but if I need to do it using CNA and no one is connected to the switch except me how i can do it ?
0
Get Certified for a Job in Cybersecurity

Want an exciting career in an emerging field? Earn your MS in Cybersecurity and get certified in ethical hacking or computer forensic investigation. WGU’s MSCSIA degree program was designed to meet the most recent U.S. Department of Homeland Security (DHS) and NSA guidelines.  

 
Craig BeckCommented:
Have you added priv 15 to the user account on the switch...?

username CNA privilege 15 secret password123

Open in new window

0
 
AlkannetworksAuthor Commented:
yes
username CNA privilege 15 secret dfsdfsdfsdfsd345345cfsdf
0
 
Craig BeckCommented:
How's your authentication configured?
0
 
AlkannetworksAuthor Commented:
My Current configuration :
version 15.2
no service pad
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
service compress-config
service sequence-numbers
!
hostname cisco-SW
!
boot-start-marker
boot-end-marker
!
!
vrf definition Mgmt-vrf
 !
 address-family ipv4
 exit-address-family
 !
 address-family ipv6
 exit-address-family
!
!
username cisco privilege 15 secret 5 $1$I2JR$w4Wb6Y6vRh5458555MyTEJMR0
no aaa new-model
switch 1 provision ws-c3850-24t
!
!
ip routing
!
ip domain-name cisco.local
!
!
qos queue-softmax-multiplier 100
!
crypto pki trustpoint TP-self-signed-1049579995
 enrollment selfsigned
 subject-name cn=IOS-Self-Signed-Certificate-1049579995
 revocation-check none
 rsakeypair TP-self-signed-1049579995
!
!
crypto pki certificate chain TP-self-signed-1049579995
 certificate self-signed 01
   4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 30343935
  37393939 3530819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100A2F3 3316DDDE 946FEED2 5175E5DA 10BBDCBE FD60F29C 83C0F207 875A93D7
  B72329F0 413A08B9 84672A34 8EF737D6 BD8D6AED A66ABE6D 3794E074 41F77BCD
  F8FACE6F F228D037 762DBF8E EF2E142B 464B6CC6 BED39363 B95FAF11 C54F8021
  CC7B040A 48A60505 9BC7D248 B75A4153 B8DBCE99 8178BEC2 AF891298 ABD7FCFA
  AE3D0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
  551D2304 18301680 14CB69F6 78CF2F06 6A9F466B 30193CB9 8688C3E7 FF301D06
  C55FB0EF E2C00586 913F0861 18A6A5
        quit
diagnostic bootup level minimal
spanning-tree mode pvst
spanning-tree extend system-id
hw-switch switch 1 logging onboard message level 3
!
redundancy
 mode sso
!!
class-map match-any non-client-nrt-class
!
policy-map port_child_policy
 class non-client-nrt-class
  bandwidth remaining ratio 10
!
!
interface GigabitEthernet0/0
 vrf forwarding Mgmt-vrf
 no ip address
 negotiation auto
!
interface GigabitEthernet1/0/1
 no switchport
 ip address 50.50.5.2 255.255.255.0
!
interface GigabitEthernet1/0/2
!
interface GigabitEthernet1/0/3
 switchport access vlan 2
!
interface GigabitEthernet1/0/4
!
interface GigabitEthernet1/0/5
!
interface GigabitEthernet1/0/6
!
interface GigabitEthernet1/0/7
!
interface GigabitEthernet1/0/8
!
interface GigabitEthernet1/0/9
!
interface GigabitEthernet1/0/10
!
interface GigabitEthernet1/0/11
 switchport mode trunk
!
interface GigabitEthernet1/0/12
!
interface GigabitEthernet1/0/13
 switchport mode trunk
!
interface GigabitEthernet1/0/14
!
interface GigabitEthernet1/0/15
 switchport mode trunk
!
interface GigabitEthernet1/0/16
!
interface GigabitEthernet1/0/17
 switchport mode trunk
!
interface GigabitEthernet1/0/18
!
interface GigabitEthernet1/0/19
 switchport mode trunk
!
interface GigabitEthernet1/0/20
!
interface GigabitEthernet1/0/21
!
interface GigabitEthernet1/0/22
!
interface GigabitEthernet1/0/23
!
interface GigabitEthernet1/0/24
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
 ip address 192.168.1.250 255.255.255.0
 ip helper-address 192.168.1.6
!
interface Vlan2
 ip address 192.168.2.250 255.255.255.0
 ip helper-address 192.168.1.6
!
interface Vlan3
 ip address 10.0.0.250 255.255.255.0
 ip helper-address 192.168.1.6
!
ip default-gateway 192.168.1.1
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 192.168.1.1
ip route 172.16.0.0 255.255.0.0 50.50.5.1

!
!
line con 0
 password 7 07212E736B070D370E325C5556557F
 login
 stopbits 1
line aux 0
 password 707212E736B070D370E325C5556557F
 login
 stopbits 1
line vty 0 4
 password 707212E736B070D370E325C5556557F
 login
line vty 5 15
 password 707212E736B070D370E325C5556557F
 login
!
wsma agent exec
 profile httplistener
 profile httpslistener
!
wsma agent config
 profile httplistener
 profile httpslistener
!
wsma agent filesys
 profile httplistener
 profile httpslistener
!
wsma agent notify
 profile httplistener
 profile httpslistener
!
!
wsma profile listener httplistener
 transport http
!
wsma profile listener httpslistener
 transport https
!
ap group default-group
end
0
 
Craig BeckCommented:
Try...

line vty 0 4
 login authentication default
line vty 5 15
 login authentication default

Open in new window

0
 
AlkannetworksAuthor Commented:
where i can add this
0
 
Craig BeckCommented:
Via the CLI
0
 
AlkannetworksAuthor Commented:
I can't find "authentication default"  as below my version 15.2

SW(config-line)#login
SW(config-line)#login ?
  local  Local password checking
  <cr>
0
 
AlkannetworksAuthor Commented:
Many Thanks
0
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.