Cisco 3020 - Catalyst Blade Switch Release Note page 15

Release notes for the cisco catalyst blade switch 3020 for hp, cisco ios release 12.2(35)se and later
Hide thumbs Also See for 3020 - Cisco Catalyst Blade Switch:
Table of Contents

Advertisement

CSCsg18176
When dynamic ARP inspection is enabled and IP validation is disabled, the switch drops ARP
requests that have a source address of 0.0.0.0.
The workaround is to configure an ARP access control list (ACL) that permits IP packets with a
source IP address of 0.0.0.0 (and any MAC) address) and apply the ARP ACL to the desired DAI
VLANs.
CSCsg21537
When MAC addresses are learned on an Etherchannel port, the addresses are incorrectly deleted
from the MAC address table even when the MAC address table aging timeout value is configured to
be longer than the ARP timeout value. This causes intermittent unicast packet flooding in the
network.
The MAC address is automatically relearned after the ARP refresh. The workaround is to enter the
ping ip address privileged EXEC command from the switch to the next hop router to avoid the
intermittent flooding.
CSCsg30295
When you configure an IP address on a switch virtual interface (SVI) with DCHP and enable DHCP
snooping on the SVI VLAN, the switch SVI cannot obtain an IP address.
The workaround is to not enable DCHP snooping on the SVI VLAN or to use a static IP address for
the SVI.
CSCsg48163
When the flowcontrol setting for received pause frames is enabled, the switch shows the operational
state as off.
There is no workaround.
CSCsg79506
During repeated reauthentication of supplicants on an IEEE 802.1x-enabled switch, if the RADIUS
server is repeatedly going out of service and then coming back up, the available switch memory
might deplete over time, eventually causing the switch to shut down.
There is no workaround, except to ensure that the RADIUS server is stable.
CSCsg81334
If IEEE 802.1x critical authentication is not enabled and the RADIUS authentication server is
temporarily unavailable during a reauthentication, when the RADIUS server comes back up, MAC
authentication bypass (MAB) does not authenticate a previously authenticated client.
The workaround is to enter the shutdown interface configuration command followed by the no
shutdown command on the port connected to the client. An alternative, to prevent the problem from
occurring, is to enable critical authentication by entering the dot1x critical {eapol | recovery delay
milliseconds} global configuration command.
OL-8918-03
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(35)SE and Later
Open Caveats
15

Advertisement

Table of Contents
loading

Table of Contents