HP Cisco Catalyst Blade Switch 3020 Release Notes for Cisco Catalyst Blade Swi - Page 16
On a switch running Protocol-Independent Multicast PIM and Source Specific Multicast SSM
View all HP Cisco Catalyst Blade Switch 3020 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 16 highlights
Resolved Caveats • CSCti95834 When you enter the ipv6 traffic-filter interface configuration command, it might not filter traffic as expected, and it might allow traffic to pass through. There is no workaround. • CSCtj03875 When you disconnect the spanning tree protocol (STP) peer link, the STP port path cost configuration changes. There is no workaround. • CSCtj75471 When a spanning-tree bridge protocol data unit (BPDU) is received on an 802.1Q trunk port and has a VLAN ID is greater than or equal to 4095, the spanning-tree lookup process fails. There is no workaround. • CSCtj83964 On a switch running Protocol-Independent Multicast (PIM) and Source Specific Multicast (SSM), multicast traffic might not be sent to the correct port after the switch reloads. The workaround is to enter the clear ip route privileged EXEC command or reconfigure PIM and SSM after a reload. • CSCtj88307 When you enter the default interface, switchport, or no switchport interface configuration command on the switch, this message appears: EMAC phy access error, port 0, retrying...... There is no workaround. • CSCtk11275 On a switch running Cisco IOS Release 12.2(55)SE with the parser config cache interface global configuration command in the configuration, when you use the CISCO-MAC-NOTIFICATION-MIB to enable the SNMP MAC address notification trap, the trap is enabled, but the trap setting does not appear in the switch configuration. The workaround is to remove the parser config cache interface command from the configuration. • CSCtk13113 The CPU usage on a standalone switch varies as the switch updates the running configuration. There is no workaround. • CSCtl42740 When 802.1x MAC authentication bypass with multidomain authentication and critical VLAN are enabled on an interface on a switch running Cisco IOS Release 12.2(53)SE or later, if the switch loses connectivity with the AAA server, the switch might experience high CPU usage and show these messages: AUTH-EVENT (Gi0/15) Received clear security violation AUTH-EVENT (Gi0/15) dot1x_is_mab_interested_in_mac: Still waiting for a MAC on port GigabitEthernet0/15 There is no workaround. • CSCtl51859 Neighbor discovery fails for IPv6 hosts connected to the switch when the IPv6 MLD snooping feature is enabled globally on the switch. Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(58)SE and Later 16 OL-24325-01