Limitations In Junos Os Release 10.4 For Ex Series Switches; Access Control And Port Security; Bridging, Vlans, And Spanning Trees - Juniper JUNOS OS 10.4 - RELEASE NOTES REV 5 Release Note

Hide thumbs Also See for JUNOS OS 10.4 - RELEASE NOTES REV 5:
Table of Contents

Advertisement

JUNOS OS 10.4 Release Notes
Related
Documentation

Limitations in Junos OS Release 10.4 for EX Series Switches

190
rule or system-defined rewrite rule to an interface. For releases earlier than Junos OS
Release 10.2, EX8200 switches supported a single global rewrite rule assigned to all
Layer 2 interfaces and routed VLAN interfaces (RVIs).
When you upgrade from Junos OS releases earlier than Release 10.2 to Junos OS Release
10.2 or later, you must configure custom rewrite rules and assign them to an interface or
assign the system-defined rewrite rules to an interface for rewrites to occur.
New Features in Junos OS Release 10.4 for EX Series Switches on page 187
Limitations in Junos OS Release 10.4 for EX Series Switches on page 190
Outstanding Issues in Junos OS Release 10.4 for EX Series Switches on page 195
Resolved Issues in Junos OS Release 10.4 for EX Series Switches on page 199
Errata in Documentation for Junos OS Release 10.4 for EX Series Switches on page 203
Upgrade and Downgrade Instructions for Junos OS Release 10.4 for EX Series Switches
on page 204
This section lists the limitations in Junos OS Release 10.4R2 for EX Series switches.

Access Control and Port Security

When you have configured more than 1024 supplicants on a single interface, 802.1X
authentication might not work as expected and the 802.1X process (
The RADIUS request sent by an EX Series switch contains both Extensible
Authentication Protocol (EAP) Identity Response and State attributes.
When an external RADIUS server goes offline and comes back online after some time
(perhaps about 30 minutes), subsequent captive portal authentication requests might
fail until the
authd
daemon is restarted. As a workaround, configure the revert
interval—the time after which to revert to the primary server—and restart the
daemon.
On EX4200 switches, if you have used the EAP-TTLS authentication protocol to
authenticate 802.1X supplicants when configuring the RADIUS server, and if the
supplicant sends invalid credentials, the host never starts because the RADIUS server
does not send a failure message to the switch.

Bridging, VLANs, and Spanning Trees

On EX4200 switches, if you have configured bridge protocol data unit (BPDU) protection
on all interfaces and disabled the panning-tree protocol, BPDU protection might not
work.
When a switch is running Virtual Routing Redundancy Protocol (VRRP) and you enable
or disable a large number (on the order of 50 or more) of routed VLAN interfaces (RVIs),
the STP topology might change for a short period of time during the commit process.
dot1xd
) might fail.
authd
Copyright © 2011, Juniper Networks, Inc.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Junos os 10.4

Table of Contents