Initial logon after installing x-pack does not accept default credentials

Folks I'm following the install instructions to the tee only difference is I'm not using loopback addresses, my poc needs to install on a physical cluster

all components are 5.2, have 4 nodes running, installed x-pack and then trying the 9200 port - and the default credentials just keep recalling the dialog box.
the log below is to show my cluster.

full cluster log is here

Bottom of page

CODE
[2017-03-18T22:58:49,164][INFO ][o.e.c.s.ClusterService   ] [nn775] detected_master {sn776}{86Pxnnt8RA-X5CwmwdrqSQ}{K9G9k4PyTRSdcfOGwn7sHg}{192.168.1.181}{192.168.1.181:9300}, reason: zen-disco-receive(from master [master {sn776}{86Pxnnt8RA-X5CwmwdrqSQ}{K9G9k4PyTRSdcfOGwn7sHg}{192.168.1.181}{192.168.1.181:9300} committed version [61]])
^X[2017-03-18T22:58:50,169][INFO ][o.e.d.z.ZenDiscovery     ] [nn775] master_left [{sn776}{86Pxnnt8RA-X5CwmwdrqSQ}{K9G9k4PyTRSdcfOGwn7sHg}{192.168.1.181}{192.168.1.181:9300}], reason [failed to ping, tried [3] times, each with  maximum [30s] timeout]
[2017-03-18T22:58:50,170][WARN ][o.e.d.z.ZenDiscovery     ] [nn775] master left (reason = failed to ping, tried [3] times, each with  maximum [30s] timeout), current nodes: nodes:
   {nn775}{NbAK8UxdTKG7kgMuqzhE5g}{jGs4JBxcQKiFO0PVRwXx9w}{192.168.1.180}{192.168.1.180:9300}, local
   {dn779}{BvcF_g45SGOUrJjpJZFB2A}{UzGobZ1QSPeQrIDPSXg2Bg}{192.168.1.184}{192.168.1.184:9300}
   {dn778}{L6yBKZtASG-fE9gka2FP0w}{PmQFjwVHRpqN_F420v2maA}{192.168.1.183}{192.168.1.183:9300}
   {sn776}{86Pxnnt8RA-X5CwmwdrqSQ}{K9G9k4PyTRSdcfOGwn7sHg}{192.168.1.181}{192.168.1.181:9300}, master
   {dn777}{BGu9CoGISI6GANjfRGftog}{S2UzoounQF-MCkdZph4Fjg}{192.168.1.182}{192.168.1.182:9300}
CODE

...

Ok I'm happy to report some progress here...I figgured the incorrect credentials were cached somewhere. So I

created a new data directory
renamed the old data directory
renamed the cluster
shutdown ES on all 5 nodes
installed x-pack on all 5
rebooted all
now the default credentials work

Im moving on to the next steps of deploying security