HP Cisco Catalyst Blade Switch 3020 Release Note page 17

Cisco gigabit ethernet switch module for hp bladesystem p-class release notes cisco ios release 12.2(44)se1 and later
Hide thumbs Also See for Cisco Catalyst Blade Switch 3020:
Table of Contents

Advertisement

Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE3
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE2
Note
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
CSCee55603
An SNMP access-control list (ACL) now works correctly on virtual routing and forwarding (VRF)
interfaces.
CSCso75052
An end host no longer remains in the guest VLAN after an IEEE 802.1x authentication.
CSCsq71492
The switch no longer reloads with an address error if the TACACS+ server sends an authentication
error when the access control system is configured and a timeout request occurs.
CSCsr55949
When IEEE 802.1x port-based authentication is enabled on the switch, Extensible Authentication
Protocol (EAP) notification packets from the supplicant are no longer discarded.
CSCsu04337
In environments using Layer 2 IP Network Admission Control (NAC), long downloadable ACLs
(dACLs) with source or destination Layer 4 ports no longer cause unpredictable events in which all
traffic is dropped and URL redirects are not enforced.
CSCsg91027
When the logging event-spanning-tree interface configuration command is configured and logging
to the console is enabled, a topology change no longer generates a large number of logging
messages.
CSCsl76599
The switch no longer unexpectedly reloads while configured with IEEE 802.1x authentication and
the MAC authentication bypass feature.
CSCsl77063
When you enable detection of Cisco IP phones by entering the switchport voice detect cisco-phone
interface configuration command, the interface is no longer disabled if you connect a third-party IP
phone is connected to the interface.
This command was designed to work with Cisco IP phones; you should not enable it on
interfaces connected to third-party IP phones.
CSCsl93313
When you configure a port channel as trusted by entering the ip dhcp snooping trust interface
configuration command, the configuration is no longer lost when the link goes from down to up.
Resolved Caveats
17

Advertisement

Table of Contents
loading

Table of Contents