Guest

Preview Tool

Cisco Bug: CSCul35946 - Need an option to disable Strong Password Policy check

Last Modified

Dec 11, 2017

Products (12)

  • Cisco Data Center Network Manager
  • Cisco MDS 9124 Multilayer Fabric Switch
  • Cisco MDS 9710 Multilayer Director
  • Cisco MDS 8G FC HP Blade Switch
  • Cisco MDS 9222i Multiservice Modular Switch
  • Cisco MDS 9509 Multilayer Director
  • Cisco MDS 9134 Multilayer Fabric Switch
  • Cisco MDS 9000 16-Port Storage Services Node
  • Cisco MDS 9000 18/4-Port Multiservice Module
  • Cisco MDS 9506 Multilayer Director
View all products in Bug Search Tool Login Required

Known Affected Releases

6.2(1)

Description (partial)

Symptom:
DCNM 6.2 enforces strong password policy; so that DCNM requires 8 or more characters password for SNMP v3 password. This creates problems for customers using 7 or less character passwords for SNMPv3 password. This bug requests to change the behavior of DCNM. DCNM should allow customers to enter password in any length. If DCNM cannot communicate with a device with strong password enforced, the DCNM should then display an error message.

Conditions:
Version 6.2(1)
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.