HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 19
Related Documentation
View all HP Cisco Catalyst Blade Switch 3020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 19 highlights
Related Documentation OSPFv3 neighbors might flap because of the way the switch handles IPv6 traffic destined for well-known IPv6 multicast addresses. There is no workaround. • CSCts36715 Users connecting to the network through a device configured for web proxy authentication may experience a web authentication failure. There is no workaround. Use the clear tcp tcb command to release the HTTP Proxy Server process. • CSCtt11621 Using the dot1x default command on a port disables access control on the port and resets the values of the authentication host-mode and authentication timer reauthenticate commands to the default values. The workaround is to avoid using the dot1x default command and set various dot1x parameters individually. You can also reconfigure the parameters that were changed after you entered the dot1x default command. • CSCtx33436 When using the switchport port-security maximum 1 vlan access command, if an IP-phone with a personal computer connected to it is connected to an access port with port security, a security violation will occur on the interface. This type of message is displayed on the console: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address XXXX.XXXX.XXXX on port FastEthernet0/1. Here is a sample configuration: interface gigabitethernet 3/0/47 switchport access vlan 2 switchport mode access switchport voice vlan 3 switchport port-security maximum 2 switchport port-security maximum 1 vlan access switchport port-security maximum 1 vlan voice switchport port-security The workaround is to remove the line switchport port-security maximum 1 vlan access. • CSCtx96491 The switch does not correctly detect a loopback when the switch port on an authenticated IP phone is looped to a port configured and authenticated with dot1x security, even when bpduguard is configured on the interface. This situation can result in 100 percent CPU utilization and degraded switch performance. The workaround is to configure the interface with the authentication open command or to configure authentication mac-move permit on the switch. Related Documentation User documentation in HTML format includes the latest documentation updates and might be more current than the complete book PDF available on Cisco.com. These documents provide complete information about the Cisco Catalyst Blade Switch 3020 for HP and are available at Cisco.com: http://www.cisco.com/en/US/products/ps8743/tsd_products_support_series_home.html OL-27324-02 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later 19