HP Cisco Catalyst Blade Switch 3020 Release Notes for the Cisco Catalyst Blade - Page 19

Related Documentation

Page 19 highlights

Related Documentation OSPFv3 neighbors might flap because of the way the switch handles IPv6 traffic destined for well-known IPv6 multicast addresses. There is no workaround. • CSCts36715 Users connecting to the network through a device configured for web proxy authentication may experience a web authentication failure. There is no workaround. Use the clear tcp tcb command to release the HTTP Proxy Server process. • CSCtt11621 Using the dot1x default command on a port disables access control on the port and resets the values of the authentication host-mode and authentication timer reauthenticate commands to the default values. The workaround is to avoid using the dot1x default command and set various dot1x parameters individually. You can also reconfigure the parameters that were changed after you entered the dot1x default command. • CSCtx33436 When using the switchport port-security maximum 1 vlan access command, if an IP-phone with a personal computer connected to it is connected to an access port with port security, a security violation will occur on the interface. This type of message is displayed on the console: %PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address XXXX.XXXX.XXXX on port FastEthernet0/1. Here is a sample configuration: interface gigabitethernet 3/0/47 switchport access vlan 2 switchport mode access switchport voice vlan 3 switchport port-security maximum 2 switchport port-security maximum 1 vlan access switchport port-security maximum 1 vlan voice switchport port-security The workaround is to remove the line switchport port-security maximum 1 vlan access. • CSCtx96491 The switch does not correctly detect a loopback when the switch port on an authenticated IP phone is looped to a port configured and authenticated with dot1x security, even when bpduguard is configured on the interface. This situation can result in 100 percent CPU utilization and degraded switch performance. The workaround is to configure the interface with the authentication open command or to configure authentication mac-move permit on the switch. Related Documentation User documentation in HTML format includes the latest documentation updates and might be more current than the complete book PDF available on Cisco.com. These documents provide complete information about the Cisco Catalyst Blade Switch 3020 for HP and are available at Cisco.com: http://www.cisco.com/en/US/products/ps8743/tsd_products_support_series_home.html OL-27324-02 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later 19

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20

19
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later
OL-27324-02
Related Documentation
OSPFv3 neighbors might flap because of the way the switch handles IPv6 traffic destined for
well-known IPv6 multicast addresses.
There is no workaround.
CSCts36715
Users connecting to the network through a device configured for web proxy authentication may
experience a web authentication failure.
There is no workaround. Use the
clear tcp tcb
command to release the HTTP Proxy Server process.
CSCtt11621
Using the
dot1x default
command on a port disables access control on the port and resets the values
of the
authentication host-mode
and
authentication timer reauthenticate
commands to the
default values.
The workaround is to avoid using the
dot1x default
command and set various dot1x parameters
individually. You can also reconfigure the parameters that were changed after you entered the
dot1x
default
command.
CSCtx33436
When using the
switchport port-security maximum
1
vlan
access
command, if an IP-phone with
a personal computer connected to it is connected to an access port with port security, a security
violation will occur on the interface. This type of message is displayed on the console:
%PORT_SECURITY-2-PSECURE_VIOLATION: Security violation occurred, caused by MAC address
XXXX.XXXX.XXXX on port FastEthernet0/1.
Here is a sample configuration:
interface gigabitethernet
3/0/47
switchport access vlan 2
switchport mode access
switchport voice vlan 3
switchport port-security maximum 2
switchport port-security maximum 1 vlan access
switchport port-security maximum 1 vlan voice
switchport port-security
The workaround is to remove the line
switchport port-security maximum
1
vlan
access
.
CSCtx96491
The switch does not correctly detect a loopback when the switch port on an authenticated IP phone
is looped to a port configured and authenticated with dot1x security, even when
bpduguard
is
configured on the interface. This situation can result in 100 percent CPU utilization and degraded
switch performance.
The workaround is to configure the interface with the
authentication open
command or to
configure
authentication mac-move permit
on the switch.
Related Documentation
User documentation in HTML format includes the latest documentation updates and might be more
current than the complete book PDF available on Cisco.com.
These documents provide complete information about the Cisco Catalyst Blade Switch 3020 for HP and
are available at Cisco.com: