HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 21

no mac, address-table static, interface

Page 21 highlights

OL-22861-04 Resolved Caveats • CSCtc57809 Switches running Cisco IOS Release 12.2(52)SE might reload after you enter the no mac address-table static mac-address vlan vlan-id interface interface-id global configuration command if the interface is up and the MAC address was dynamically learned before it was changed to static. Use one of these workarounds: - Clear the dynamic MAC address table when configuring static MAC addresses as in this example: Switch(config)# no mac address-table learning vlan vlan_id Switch(config)# clear mac-address-table dynamic address mac_address Switch(config)# mac address-table static mac_address vlan vlan_id interface interface_id Switch(config)# mac address-table learning vlan vlan_id - Downgrade to Cisco IOS Release 12.2(50)SE. - Upgrade to Cisco IOS Release 12.2(53)SE if available. • CSCtd29049 A switch that has at least one trunk port configured might fail when you configure more than 950 VLANS by using the vlan vlan-id global configuration command. There is no workaround. • CSCte00827 When a port that is configured for Switched Port Analyzer (SPAN) goes up and down, a memory leak occurs in the 'hpm main' process. There is no workaround. • CSCte14603 A vulnerability in the Internet Group Management Protocol (IGMP) version 3 implementation of Cisco IOS Software and Cisco IOS XE Software allows a remote unauthenticated attacker to cause a reload of an affected device. Repeated attempts to exploit this vulnerability could result in a sustained denial of service (DoS) condition. Cisco has released free software updates that address this vulnerability. This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20100922-igmp.shtml. Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory. The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that have been published on September 22, 2010, or earlier: http://www.cisco.com/warp/public/707/cisco-sa-20100922-bundle.shtml Individual publication links are in "Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication" at the following link: http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html • CSCte72365 After a software upgrade from Cisco IOS Release 12.2(52)SE to Cisco IOS Release 12.2(53)SE, EIGRP hello packets are flooded on access ports belonging to another subnet. The same result occurs when you initiate ping requests to the broadcast address of other subnets. This results in Not on common subnet errors on the other side of the link. Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later 21

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34

21
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(55)SE and Later
OL-22861-04
Resolved Caveats
CSCtc57809
Switches running Cisco IOS Release 12.2(52)SE might reload after you enter the
no mac
address-table static
mac-address
vlan
vlan-id
interface
interface-id
global configuration
command if the interface is up and the MAC address was dynamically learned before it was changed
to static.
Use one of these workarounds:
Clear the dynamic MAC address table when configuring static MAC addresses as in this
example:
Switch(config)#
no mac address-table learning vlan
vlan_id
Switch(config)#
clear mac-address-table dynamic address
mac_address
Switch(config)#
mac address-table static
mac_address
vlan
vlan_id
interface
interface_id
Switch(config)#
mac address-table learning vlan
vlan_id
Downgrade to Cisco IOS Release 12.2(50)SE.
Upgrade to Cisco IOS Release 12.2(53)SE if available.
CSCtd29049
A switch that has at least one trunk port configured might fail when you configure more than 950
VLANS by using the
vlan
vlan-id global configuration command.
There is no workaround.
CSCte00827
When a port that is configured for Switched Port Analyzer (SPAN) goes up and down, a memory
leak occurs in the ‘hpm main’ process.
There is no workaround.
CSCte14603
A vulnerability in the Internet Group Management Protocol (IGMP) version 3 implementation of
Cisco IOS Software and Cisco IOS XE Software allows a remote unauthenticated attacker to cause
a reload of an affected device. Repeated attempts to exploit this vulnerability could result in a
sustained denial of service (DoS) condition. Cisco has released free software updates that address
this vulnerability.
This advisory is posted at
.
Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled publication includes
six Cisco Security Advisories. Five of the advisories address vulnerabilities in Cisco IOS Software,
and one advisory addresses vulnerabilities in Cisco Unified Communications Manager. Each
advisory lists the releases that correct the vulnerability or vulnerabilities detailed in the advisory.
The table at the following URL lists releases that correct all Cisco IOS Software vulnerabilities that
have been published on September 22, 2010, or earlier:
Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security
Advisory Bundled Publication” at the following link:
CSCte72365
After a software upgrade from Cisco IOS Release 12.2(52)SE to Cisco IOS Release 12.2(53)SE,
EIGRP hello packets are flooded on access ports belonging to another subnet. The same result
occurs when you initiate ping requests to the broadcast address of other subnets. This results in
Not
on common subnet
errors on the other side of the link.