Cisco 3020 - Catalyst Blade Switch Release Note

Release notes for the cisco catalyst blade switch 3020 for hp, cisco ios release 12.2(37)se and later
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:

Advertisement

Release Notes for the Cisco Catalyst
Blade Switch 3020 for HP,
Cisco IOS Release 12.2(37)SE and Later
Revised August 8, 2007
Cisco IOS Release 12.2(37)SE and later runs on the Cisco Catalyst Blade Switch 3020 for HP, also
referred to as the switch.
These release notes include important information about Cisco IOS Release 12.2(37)SE and later and
any limitations, restrictions, and caveats that apply to them. Verify that these release notes are correct
for your switch:
For the complete list of Cisco Catalyst Blade Switch 3020 for HP documentation, see the
Documentation" section on page
You can download the switch software from this site (registered Cisco.com users with a login password):
http://www.cisco.com/kobayashi/sw-center/sw-lan.shtml
This software release is part of a special release of Cisco IOS software that is not released on the same
8-week maintenance cycle that is used for other platforms. As maintenance releases and future software
releases become available, they will be posted to Cisco.com in the Cisco IOS software area.
Contents
This information is in the release notes:
Americas Headquarters:
Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA
© <year> Cisco Systems, Inc. All rights reserved.
If you are installing a new switch, see the Cisco IOS release label on the rear panel of your switch.
If your switch is on, use the show version privileged EXEC command. See the
Software Version and Feature Set" section on page
If you are upgrading to a new release, see the software upgrade filename for the software version.
See the
"Deciding Which Files to Use" section on page
"System Requirements" section on page 2
"Upgrading the Switch Software" section on page 3
"Installation Notes" section on page 6
4.
22.
"Finding the
4.
"Related

Advertisement

Table of Contents
loading

Summary of Contents for Cisco 3020 - Cisco Catalyst Blade Switch

  • Page 1 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(37)SE and Later Revised August 8, 2007 Cisco IOS Release 12.2(37)SE and later runs on the Cisco Catalyst Blade Switch 3020 for HP, also referred to as the switch. These release notes include important information about Cisco IOS Release 12.2(37)SE and later and any limitations, restrictions, and caveats that apply to them.
  • Page 2: System Requirements

    System Requirements “New Software Features” section on page 6 • “Limitations and Restrictions” section on page 7 • “Important Notes” section on page 11 • “Open Caveats” section on page 13 • “Resolved Caveats” section on page 16 • “Documentation Updates” section on page 20 •...
  • Page 3: Hardware Requirements

    Upgrading the Switch Software Hardware Requirements Table 2 lists the minimum hardware requirements for running the device manager. Table 2 Minimum Hardware Requirements Processor Speed DRAM Number of Colors Resolution Font Size Intel Pentium II 64 MB 1024 x 768 Small 1.
  • Page 4 Upgrading the Switch Software Finding the Software Version and Feature Set The Cisco IOS image is stored as a bin file in a directory that is named with the Cisco IOS release. A subdirectory contains the files needed for web management. The image is stored on the system board flash device (flash:).
  • Page 5 Upgrading the Switch Software You can also configure the switch as a TFTP server to copy files from one switch to another without using an external TFTP server by using the tftp-server global configuration command. For more information about the tftp-server command, see the “Basic File Transfer Services Commands” section of the Cisco IOS Configuration Fundamentals Command Reference, Release 12.2 at this URL: http://www.ciscosystems.com/en/US/products/sw/iosswrel/ps1835/products_configuration_guide_boo k09186a0080080ff9.html...
  • Page 6: Recovering From A Software Failure

    Installation Notes For /directory/image-name.tar, specify the directory (optional) and the image to download. Directory and image names are case sensitive. This example shows how to download an image from a TFTP server at 198.30.20.19 and to overwrite the image on the switch: Switch# archive download-sw /overwrite tftp://198.30.20.19/cbs30x0lanbase-mz You can also download the image file from the TFTP server to the switch and keep the current image by replacing the /overwrite option with the /leave-old-sw option.
  • Page 7: Limitations And Restrictions

    Limitations and Restrictions Limitations and Restrictions You should review this section before you begin working with the switch. These are known limitations that will not be fixed, and there is not always a workaround. Some features might not work as documented, and some features could be affected by recent changes to the switch hardware or software.
  • Page 8 Limitations and Restrictions When port security is enabled on an interface in restricted mode and the switchport block unicast • interface command has been entered on that interface, MAC addresses are incorrectly forwarded when they should be blocked The workaround is to enter the no switchport block unicast interface configuration command on that specific interface.
  • Page 9 Limitations and Restrictions MAC Addressing Multicasting These are the multicasting limitations: • If the number of multicast routes and Internet Group Management Protocol (IGMP) groups are more than the maximum number specified by the show sdm prefer global configuration command, the traffic received on unknown groups is flooded in the received VLAN even though the show ip igmp snooping multicast-table privileged EXEC command output shows otherwise.
  • Page 10 Limitations and Restrictions These are the quality of service (QoS) limitations: • Some switch queues are disabled if the buffer size or threshold level is set too low with the mls qos queue-set output global configuration command. The ratio of buffer size to threshold level should be greater than 10 to avoid disabling the queue.
  • Page 11: Important Notes

    Important Notes For trunk ports or access ports configured with IEEE 802.1Q tagging, inconsistent statistics might • appear in the show interfaces counters privileged EXEC command output. Valid IEEE 802.1Q frames of 64 to 66 bytes are correctly forwarded even though the port LED blinks amber, and the frames are not counted on the interface statistics.
  • Page 12 Important Notes Device Manager Notes These notes apply to the device manager: We recommend this browser setting to speed up the time needed to display the device manager from • Microsoft Internet Explorer. From Microsoft Internet Explorer: Choose Tools > Internet Options. Click Settings in the Temporary Internet files area.
  • Page 13: Open Caveats

    Open Caveats Beginning in privileged EXEC mode, follow these steps to configure the HTTP server interface: Command Purpose Step 1 configure terminal Enter global configuration mode. Step 2 ip http authentication {enable | local | Configure the HTTP server interface for the type of authentication that tacacs} you want to use.
  • Page 14 Open Caveats CSCsc96474 • The switch might display tracebacks similar to these examples when a large number of IEEE 802.1x supplicants try to repeatedly log in and log out. Examples: Jan 3 17:54:32 L3A3 307: Jan 3 18:04:13.459: %SM-4-BADEVENT: Event 'eapReq' is invalid for the current state 'auth_bend_idle': dot1x_auth_bend Fa9 Jan 3 17:54:32 L3A3 308: -Traceback= B37A84 18DAB0 2FF6C0 2FF260 8F2B64 8E912C Jan 3 19:06:13 L3A3 309: Jan 3 19:15:54.720: %SM-4-BADEVENT: Event 'eapReq_no_reAuthMax' is...
  • Page 15 Open Caveats CSCse33321 • The Ethernet interface fa0 loses and regains its link because of a DHCP IP address timeout. This situation exists when the HP Onboard Administrator acts as the DHCP server and provides the IP address to the fa0 interface. This occurs when using the clear arp-cache privileged EXEC command to explicitly clear the ARP table.
  • Page 16 Resolved Caveats Resolved Caveats These sections describe the caveats that have been resolved in these releases: Caveats Resolved in Cisco IOS Release 12.2(37)SE1, page 16 • Caveats Resolved in Cisco IOS Release 12.2(37)SE, page 17 • Caveats Resolved in Cisco IOS Release 12.2(37)SE1 These caveats are resolved in Cisco IOS Release 12.2.(37)SE1: CSCsc19259 •...
  • Page 17 Resolved Caveats Caveats Resolved in Cisco IOS Release 12.2(37)SE These caveats are resolved in Cisco IOS Release 12.2.(37)SE: CSCsb12598 • Cisco IOS device may crash while processing malformed Secure Sockets Layer (SSL) packets. In order to trigger these vulnerabilities, a malicious client must send malformed packets during the SSL protocol exchange with the vulnerable device.
  • Page 18 Resolved Caveats Another related advisory has been posted with this advisory. This additional advisory also Note describes a vulnerability related to cryptography that affects Cisco IOS. This related advisory is available at the following link: http://www.cisco.com/warp/public/707/cisco-sa-20070522-crypto.shtml. A combined software table for Cisco IOS is available to aid customers in choosing a software releases that fixes all security vulnerabilities published as of May 22, 2007.
  • Page 19 Resolved Caveats CSCsd60718 • When you enter the no speed interface configuration command, the Ethernet interface speed now correctly returns to its default setting. This affects interfaces Gigabit Ethernet 0/17 to Gigabit Ethernet 0/20, Gigabit Ethernet 0/23, and Gigabit Ethernet 0/24. This does not affect interfaces Gigabit Ethernet 0/21 and Gigabit Ethernet 0/22.
  • Page 20: Documentation Updates

    Documentation Updates Cisco IOS is affected by the following vulnerabilities: Processing ClientHello messages, documented as Cisco bug ID CSCsb12598 – Processing ChangeCipherSpec messages, documented as Cisco bug ID CSCsb40304 – Processing Finished messages, documented as Cisco bug ID CSCsd92405 – Cisco has made free software available to address these vulnerabilities for affected customers.
  • Page 21 Documentation Updates Updates to Software Configuration Guide This section was added to the “Configuring IEEE 802.1x Authentication” chapter: Web Authentication with Automatic MAC Check You can use web authentication with automatic MAC check to authenticate a client that does not support IEEE 802.1x or web browser functionality.
  • Page 22: Related Documentation

    Related Documentation Related Documentation These documents provide complete information about the Cisco Catalyst Blade Switch 3020 for HP and are available at Cisco.com: http://www.cisco.com/en/US/products/ps6748/tsd_products_support_series_home.html • You can order printed copies of documents with a DOC-xxxxxx= number from the Cisco.com sites and from the telephone numbers listed in the URL referenced in the “Obtaining Documentation, Obtaining Support, and Security Guidelines”...

Table of Contents