Summary of Contents for Enterasys Matrix C2 C2K122-24
Page 1
Enterasys Networks recommends that you thoroughly review this release note prior to installing or upgrading this product. There may be a more up-to-date version of this Release Note. Please go to the Enterasys web site to ensure that this is the latest revision of the Release Note (http://www.enterasys.com/support/).
Page 2
Status Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version Previous Version BOOTPROM COMPATIBILITY:...
IPv4/IPv6 Dual Host Management Support WebView SSL Interface to WebView Text-based Configuration Upload/Download Discard VLAN Tagged Frames Policy Manager Support Enterasys Policy – Single User Priority Classification L2-L4 08/13/2008 P/N: 9038155-52 F0615-O CUSTOMER RELEASE NOTES Existing Product Features Support for mixing SecureStack C3 with a...
TFTP download instructions are also available on the Enterasys support web site at: http://knowledgebase.enterasys.com/esupport/esupport.asp?ID=ent19703. Soft copies of the Configuration Guide are available at no cost to the user on the Enterasys Networks web site, http://www.enterasys.com/support/manuals. To order hard copies of the Configuration Guide, contact your Enterasys representative.
Page 5
―disabled‖ will require no action. Configuration files that were created in the 1.xx.xx track can be applied to a switch/stack using the 2.xx.xx track, however the steps defined above for configuring GVRP must be observed.
Page 6
10874 Corrected an issue when under certain circumstances the SNTP client stopped processing requests. 10906 Corrected an issue that could prevent policy configurations from being loaded by the switch. 10972 Corrected an issue which could result in the loss of SNMP management.
Page 7
10700 Corrected an issue which prevented the "host ip" value to be properly restored from a saved configuration file. 10056 Enhanced 802.1x authentication whereby the switch continues to send periodic Unicast Request Identity frames after the first client authenticates. Previously the switch stopped sending EAP frames after the first successful authentication.
Page 8
Corrected an issue where ASM is unable to apply actions to ports. Corrected an issue concerning the ―set ip protocol‖ command. If the static IP address of a switch is stored in a configuration file, then the IP is changed to be acquired using DHCP, the original IP can now be restored using the saved configuration file.
Page 9
Changes and Enhancements in 5.01.01.0051 Corrected an issue in the Enterasys CoS MIB that could prevent new CoS MIB settings from being applied and enforced from Policy Manager. This issue was originally introduced in the 5.01.01.0047 firmware.
Page 10
Changed the default logging severity level to 6. The result of this will be that more informational messages may be seen in Syslog and CLI than in previous images. However, this does not affect the operation of the switch. Added support for LACP short timers.
Page 11
Users now have the ability to set objects via name for RMON Alarms, such as ―set rmon alarm properties 1 object ifOperStatus.1‖. A static LAG between multiple units of a SecureStack switch and a Cisco 2950 switch will now recover after a "set switch movemanagement" command is executed.
Page 12
Corrected a potential reset condition that occurred when clearing the RMON history using the ―clear rmon history to-defaults‖ command. Corrected an issue that occurred when processing an invalid policy role received from RADIUS. The switch now applies the default port role, where previously the existing port role was unchanged.
Page 13
Corrected an issue that could cause instability when stacking units 8 high. Corrected an issue with Multiple User Authentication where the switch may continue to attempt to MAC authenticate a user that has already been authenticated using 802.1X.
Page 14
Corrected an issue where the ―show ip ospf database‖ command could cause the console to lock. Corrected an issue with the Enterasys Syslog MIB which could prevent setting Syslog servers via SNMP. Corrected an issue where internally-generated ARP requests could be forwarded out ports in a Spanning Tree discarding state.
Page 15
An issue whereby invalid info from dot1qVlanCurrentUntaggedPorts was being reported has been fixed. If member ports of a LAG are spread across multiple stacked members and one of the stacked members is reset, the LAG port members on the reset switch will rejoin the LAG once the switch becomes operational again.
Page 16
Resolved an issue which would cause the stack to reset after creating twenty-three routing interfaces. Changes and Enhancements in 4.00.31 The switch will now include the correct port number in the NAS-Port-Id attribute field when sending a RADIUS Authentication Request to a RADIUS server.
Page 17
PWA has been improved to ensure access to the PWA authentication server, even under heavy traffic loads. Configuring the SecureStack C2 switch with a non-default ―set length‖ value will no longer prematurely close telnet sessions when executing commands which output large amounts of data.
Page 18
Resolved an issue with CDP which could cause the device CPU utilization to rise to 100%. The SecureStack C2 switch correctly governs the period of time for which the TC bit will be marked in a spanning tree BDPU when a port transitions to forwarding state.
Page 19
CUSTOMER RELEASE NOTES Changes and Enhancements in 3.03.33 The ―clear SNMP access‖ commands have been removed from the default configuration. Login accounts on the device will be managed in the following manner: Accounts with ―read-write‖ or ―read-only‖ permissions will be locked out after the number of sequential failed login attempts exceeds the configured login attempts value.
Page 20
ARP packet. The PWA port control options have been changed to match those found on the Enterasys DFE switches. When a SecureStack device suffers from a power system failure, the system will now send trap from the etsysPsePowerNotification MIB, which can be correctly decoded by NetSight Console.
Page 21
If a directly connected RIP interface looses link, the router can now learn alternative routes to the network through its other RIP interfaces. If a C2 is acting as a switch in a VRRP network and the VRRP master moves to another port, the C2 will correctly update its tables with this information.
Page 22
Changes and Enhancements in 3.01.90 A variety of enhancements have been made to MAC authentication. MAC authentication can be configured as a single user per port or in ―piggy-back‖ mode where once an initial user is authenticated, multiple users can share the same port and policy assignment assigned to the port.
Page 23
The device will no longer clear the host ARP table when pinging from the console, and will now display all learned entries in the host ARP table when executing the switch command ―show arp‖. In previous images, users were only allowed to create 99 rules in a policy even though 100 rules were supported.
Page 24
CUSTOMER RELEASE NOTES Changes and Enhancements in 3.01.52 A problem existed in previous versions, under extremely high traffic load the stack manager could become isolated from the stack causing a second manager to become elected. This has been resolved. The master will now correctly prioritize and process STP packets under extremely high traffic loads. In earlier versions this had occasionally resulted in a reset and a new master being selected.
Page 25
An issue has been resolved in this release where when executing the command ―show vlan static‖ the output will correctly list the gigabit ports as ge.unit.port. When assigning switch characteristics to a port, a user can now freely use port ranges instead of having to assign the characteristics to each port individually (i.e., ―set gvrp disable ge.1.49-50‖).
Page 26
A ―show radius accounting status‖ command has been added. A problem causing stack communication issues, RPC timeouts, and master reset has been resolved. A problem with CDP denoting the switch as SecureFast switch 1.8 or greater has been resolved. Changes and Enhancements in 2.01.24 Support has been added for NetSight Automated Security Manager version 2.0 or later.
Page 27
An OID has been implemented in the switch which can be polled via SNMP to return the switch‘s default gateway IP. A problem with setting the IP address on the switch, which caused an additional IP destination to be seen until the switch is reloaded, has been resolved.
Page 28
When using macauthentication, if the multiauth session-timeout is set through the CLI, users are not able to re- authenticate once the session timeout expires. Workaround: Use the Radius server to configure the session timeout instead of the CLI on the switch. The session-timeout works correctly when returned by the Radius server, allowing users to re-authenticate.
Page 29
If you have a LAG between a SecureStack device and an Enterasys DFE device on which you disable lacp (set port lacp port) on LAG member ports on the DFE and then re-enable them, the LAG will not properly reform on the SecureStack.
Page 30
The command only has an effect on how untagged traffic will be prioritized as it passes internally through the SecureStack C2 switch. Each physical port of the SecureStack C2 switch will now support six configurable priority queues per port. The capability will be unlocked upon upgrade if the SecureStack C2 switch has no previously configured priority-queue mapping.
Page 31
10 minutes to 17 minutes. After the initial value is incorrectly set, the counter will increment normally. When creating an inter-switch link (ISL) between two SecureStack PoE units via RJ45 or RJ21 ports, the CLI occasionally will report the ports as delivering minute amounts of power across the ISL or may display "Other Fault"...
Page 32
The default broadcast suppression threshold for all ports has been set to 14881 to allow the device to be backward compatible with previous images. Enterasys recommends administrators consider the following recommendations before configuring the SecureStack-C2 for a PIM-SM environment. 1) A C2 cannot be configured as a Candidate-RP or a Candidate-BSR.
Page 33
9 minutes to close the telnet session. During this time the user cannot perform any actions through the current connection. If the CoS state is disabled but a CoS priority has been configured, the switch will continue to forward packets with the CoS priority, however the ToS field will not be modified.
Page 34
Before executing the ―set switch movemanagment‖ command, the user should execute the ―save config‖ file to ensure no recent changes are lost.
Page 35
After setting the port to 10 MB full duplex, if the switch is reset, the port will come up as 100 full. Policy roles and rules cannot be applied to ports that are members of a link aggregation group.
For the most up-to-date information concerning known issues, go to the Global Knowledgebase section at http://www.enterasys.com/support/. For the latest copy of this release note, go to http://www.enterasys.com/services/support/downloads/. To report an issue not listed in this document or in the Global Knowledgebase, contact our Technical Support Staff.
Enterasys Networks Private Enterprise MIBs are available in ASN.1 format from the Enterasys Networks web site http://www.enterasys.com/support/mibs/ SNMP TRAP SUPPORT: RFC No. RFC 1213 RFC 1493 RFC 1757 08/13/2008 P/N: 9038155-52 F0615-O Title .
Attribute Acct-Session-Id RFC 2866 Acct-Terminate-Cause RFC 2866 GLOBAL SUPPORT: By Phone: 978-684-1000 1-800-872-8440 (toll-free in U.S. and Canada) For the Enterasys Networks Support toll-free number in your country: http://www.enterasys.com/support/ By Email: support@enterasys.com By Web: http://www.enterasys.com/support/ By Fax: 978-684-1499 By Mail: Enterasys Networks, Inc.
Page 39
Procedure Enable CoS on the switch. (Default state is disabled.) set cos state enable 2. Create a CoS flood control port resource. This will specify flood control rate limiters that can be mapped to...
Configuring SMON MIB Port Mirroring Overview SMON port mirroring support on Enterasys SecureStack B2, B3, C2 and C3 devices allows you to redirect traffic on ports remotely using SMON MIBs. This is useful for troubleshooting or problem solving when network management through the console port, telnet, or SSH is not feasible.
Page 41
C3(su)->show port mirroring Port Mirroring ============== Source Port = ge.1.3 Target Port = ge.1.2 Frames Mirrored = Rx and Tx Port Mirroring status disabled When you are ready to enable this instance, enter MIB option 1 (active) and perform an SNMP Set operation.
Need help?
Do you have a question about the Matrix C2 C2K122-24 and is the answer not in the manual?
Questions and answers