HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 20

Caveats Resolved in Cisco IOS Release 12.2(55)SE2 and Earlier

Page 20 highlights

Resolved Caveats • CSCto55124 When a member switch port security is used with port-based dot1x authentication and the switch MAC address is sticky, a connected device authenticates itself. Its MAC address is added as sticky in the switch configuration and in the port security tables of the stack switches. When the switch is shut down, the device MAC address is removed from the master switch, but it is retained in the member switch security tables. When the interface is re-enabled, the device MAC address is restored to the master switch configuration. The workaround is to use port security without dot1x authentication. Caveats Resolved in Cisco IOS Release 12.2(55)SE2 and Earlier • CSCsu31853 The buffer space of a switch running TCP applications is full while the TCP sessions are in the TIME_WAIT state. Buffer space becomes available after the TCP session the closed. There is no workaround. • CSCsx29696 On switches running Cisco IOS Release 12.2(35)SE or later, connectivity issues might occur with these messages: %SUPQ-4-CPUHB_RECV_STARVE: Still seeing receive queue stuck after throttling There is no workaround. • CSCsz18634 On a switch running Cisco IOS Release 12.2(46)SE, the output of the show interfaces privileged EXEC command shows 0 packets for port channel input and output rates. The workaround is to reload the switch by entering the reload privileged EXEC command. • CSCtb58779 When a switch is low on memory (less than 256 MB), it can reload and display a SYS-2-WATCHDOG error. There is no workaround. Enter the show memory debug leak privileged EXEC command to check for signs of a memory leak and address these symptoms. • CSCtc02635 On switches running Cisco IOS Release 12.2(50)SE3 running MAC authentication bypass with multidomain authentication (MDA), IP phones connected to a port might not be able to regain network connectivity in the VOICE domain if the session times out and all RADIUS servers are unreachable. There is no workaround. Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later 20 OL-22861-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34

20
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later
OL-22861-04
Resolved Caveats
CSCto55124
When a member switch port security is used with port-based dot1x authentication and the switch
MAC address is sticky, a connected device authenticates itself. Its MAC address is added as sticky
in the switch configuration and in the port security tables of the stack switches. When the switch is
shut down, the device MAC address is removed from the master switch, but it is retained in the
member switch security tables. When the interface is re-enabled, the device MAC address is restored
to the master switch configuration.
The workaround is to use port security without dot1x authentication.
Caveats Resolved in Cisco IOS Release 12.2(55)SE2 and Earlier
CSCsu31853
The buffer space of a switch running TCP applications is full while the TCP sessions are in the
TIME_WAIT state. Buffer space becomes available after the TCP session the closed.
There is no workaround.
CSCsx29696
On switches running Cisco IOS Release 12.2(35)SE or later, connectivity issues might occur with
these messages:
%SUPQ-4-CPUHB_RECV_STARVE: Still seeing receive queue stuck after throttling
There is no workaround.
CSCsz18634
On a switch running Cisco IOS Release 12.2(46)SE, the output of the
show interfaces
privileged
EXEC command shows 0 packets for port channel input and output rates.
The workaround is to reload the switch by entering the
reload
privileged EXEC command.
CSCtb58779
When a switch is low on memory (less than 256 MB), it can reload and display a
SYS-2-WATCHDOG error.
There is no workaround. Enter the
show memory debug leak
privileged EXEC command to check
for signs of a memory leak and address these symptoms.
CSCtc02635
On switches running Cisco IOS Release 12.2(50)SE3 running MAC authentication bypass with
multidomain authentication (MDA), IP phones connected to a port might not be able to regain
network connectivity in the VOICE domain if the session times out and all RADIUS servers are
unreachable.
There is no workaround.