Related Documentation - HP Cisco Catalyst Blade Switch 3020 Release Note

Release notes for the cisco catalyst blade switch 3020 for hp, cisco ios release 15.0(2) se and later
Hide thumbs Also See for Cisco Catalyst Blade Switch 3020:
Table of Contents

Advertisement

Related Documentation

User documentation in HTML format includes the latest documentation updates and might be more
current than the complete book PDF available on Cisco.com.
These documents provide complete information about the Cisco Catalyst Blade Switch 3020 for HP and
are available at Cisco.com:
http://www.cisco.com/en/US/products/ps8743/tsd_products_support_series_home.html
OL-27324-02
OSPFv3 neighbors might flap because of the way the switch handles IPv6 traffic destined for
well-known IPv6 multicast addresses.
There is no workaround.
CSCts36715
Users connecting to the network through a device configured for web proxy authentication may
experience a web authentication failure.
There is no workaround. Use the clear tcp tcb command to release the HTTP Proxy Server process.
CSCtt11621
Using the dot1x default command on a port disables access control on the port and resets the values
of the authentication host-mode and authentication timer reauthenticate commands to the
default values.
The workaround is to avoid using the dot1x default command and set various dot1x parameters
individually. You can also reconfigure the parameters that were changed after you entered the dot1x
default command.
CSCtx33436
When using the switchport port-security maximum 1 vlan access command, if an IP-phone with
a personal computer connected to it is connected to an access port with port security, a security
violation will occur on the interface. This type of message is displayed on the console:
%PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address
XXXX.XXXX.XXXX on port FastEthernet0/1.
Here is a sample configuration:
interface gigabitethernet 3/0/47
switchport access vlan 2
switchport mode access
switchport voice vlan 3
switchport port-security maximum 2
switchport port-security maximum 1 vlan access
switchport port-security maximum 1 vlan voice
switchport port-security
The workaround is to remove the line switchport port-security maximum 1 vlan access.
CSCtx96491
The switch does not correctly detect a loopback when the switch port on an authenticated IP phone
is looped to a port configured and authenticated with dot1x security, even when bpduguard is
configured on the interface. This situation can result in 100 percent CPU utilization and degraded
switch performance.
The workaround is to configure the interface with the authentication open command or to
configure authentication mac-move permit on the switch.
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later
Related Documentation
19

Advertisement

Table of Contents
loading

Table of Contents