HP Cisco Catalyst Blade Switch 3020 Cisco Gigabit Ethernet Switch Module for H - Page 17

Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE3, Cisco IOS Caveats Resolved in Cisco IOS

Page 17 highlights

Resolved Caveats Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE3 • CSCee55603 An SNMP access-control list (ACL) now works correctly on virtual routing and forwarding (VRF) interfaces. • CSCso75052 An end host no longer remains in the guest VLAN after an IEEE 802.1x authentication. • CSCsq71492 The switch no longer reloads with an address error if the TACACS+ server sends an authentication error when the access control system is configured and a timeout request occurs. • CSCsr55949 When IEEE 802.1x port-based authentication is enabled on the switch, Extensible Authentication Protocol (EAP) notification packets from the supplicant are no longer discarded. • CSCsu04337 In environments using Layer 2 IP Network Admission Control (NAC), long downloadable ACLs (dACLs) with source or destination Layer 4 ports no longer cause unpredictable events in which all traffic is dropped and URL redirects are not enforced. Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE2 • CSCsg91027 When the logging event-spanning-tree interface configuration command is configured and logging to the console is enabled, a topology change no longer generates a large number of logging messages. • CSCsl76599 The switch no longer unexpectedly reloads while configured with IEEE 802.1x authentication and the MAC authentication bypass feature. • CSCsl77063 When you enable detection of Cisco IP phones by entering the switchport voice detect cisco-phone interface configuration command, the interface is no longer disabled if you connect a third-party IP phone is connected to the interface. Note This command was designed to work with Cisco IP phones; you should not enable it on interfaces connected to third-party IP phones. • CSCsl93313 When you configure a port channel as trusted by entering the ip dhcp snooping trust interface configuration command, the configuration is no longer lost when the link goes from down to up. Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later 464831-005 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28

17
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(44)SE and Later
464831-005
Resolved Caveats
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE3
CSCee55603
An SNMP access-control list (ACL) now works correctly on virtual routing and forwarding (VRF)
interfaces.
CSCso75052
An end host no longer remains in the guest VLAN after an IEEE 802.1x authentication.
CSCsq71492
The switch no longer reloads with an address error if the TACACS+ server sends an authentication
error when the access control system is configured and a timeout request occurs.
CSCsr55949
When IEEE 802.1x port-based authentication is enabled on the switch, Extensible Authentication
Protocol (EAP) notification packets from the supplicant are no longer discarded.
CSCsu04337
In environments using Layer 2 IP Network Admission Control (NAC), long downloadable ACLs
(dACLs) with source or destination Layer 4 ports no longer cause unpredictable events in which all
traffic is dropped and URL redirects are not enforced.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(44)SE2
CSCsg91027
When the logging event-spanning-tree interface configuration command is configured and logging
to the console is enabled, a topology change no longer generates a large number of logging
messages.
CSCsl76599
The switch no longer unexpectedly reloads while configured with IEEE 802.1x authentication and
the MAC authentication bypass feature.
CSCsl77063
When you enable detection of Cisco IP phones by entering the
switchport voice detect cisco-phone
interface configuration command, the interface is no longer disabled if you connect a third-party IP
phone is connected to the interface.
Note
This command was designed to work with Cisco IP phones; you should not enable it on
interfaces connected to third-party IP phones.
CSCsl93313
When you configure a port channel as trusted by entering the
ip dhcp snooping trust
interface
configuration command, the configuration is no longer lost when the link goes from down to up.