HP Cisco Catalyst Blade Switch 3020 Release Notes for Cisco Catalyst Blade Swi - Page 15

Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE2, Cisco IOS Caveats Resolved in Cisco IOS - for reset password

Page 15 highlights

Resolved Caveats • CSCta36155 A switch configured with 802.1x and port security on the same ports no longer might inappropriately put the ports into an error-disabled state. • CSCta56469 Moving a PC between two IP Phones without disconnecting either phone from the switch no longer triggers a port-security violation. • CSCta67777 A port security violation error no longer occurs when MAC address sticky learning is enabled on a port and a CDP is enabled on a connected IP Phone. Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE2 • CSCsy48370 The switch no longer fails when you use the vacant-message line configuration command. • CSCsz81762 If you enable automatic server testing through the radius-server host ip-address [test username name] global configuration command, the switch no longer sends requests to the RADIUS server if the server is not available. • CSCsw45277 Third-party IP phones now automatically power up when reconnected to enabled PoE ports on the switch. • CSCsy27389 The switch now changes the time in an EnergyWise recurrence event when the local time changes to daylight saving time. • CSCsy57970 When IEEE 802.1x multiple authentication mode is configured on a port, two PCs have been authenticated, and the first PC is disconnected, the second PC now receives and forwards traffic on the port. CSCsy91579 A switch no longer randomly resets due to memory corruption. Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE1 • CSCsb46724 If the connection to a primary AAA server fails, the backup server is now queried for login access. • CSCsr92741 When a TCP packet with all flags set to zero (at the TCP level) is sent to a remote router, the remote (destination) router no longer returns an ACK/RST packet back to the source of the TCP segment. • CSCsy24510 The switch now accepts an encrypted secret password. OL-18274-02 Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(50)SE and Later 15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26

15
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 12.2(50)SE and Later
OL-18274-02
Resolved Caveats
CSCta36155
A switch configured with 802.1x and port security on the same ports no longer might inappropriately
put the ports into an error-disabled state.
CSCta56469
Moving a PC between two IP Phones without disconnecting either phone from the switch no longer
triggers a port-security violation.
CSCta67777
A port security violation error no longer occurs when MAC address sticky learning is enabled on a
port and a CDP is enabled on a connected IP Phone.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE2
CSCsy48370
The switch no longer fails when you use the
vacant-message
line configuration command.
CSCsz81762
If you enable automatic server testing through the
radius-server host
ip-address
[
test username
name
] global configuration command, the switch no longer sends requests to the RADIUS server if
the server is not available.
CSCsw45277
Third-party IP phones now automatically power up when reconnected to enabled PoE ports on the
switch.
CSCsy27389
The switch now changes the time in an EnergyWise recurrence event when the local time changes
to daylight saving time.
CSCsy57970
When IEEE 802.1x multiple authentication mode is configured on a port, two PCs have been
authenticated, and the first PC is disconnected, the second PC now receives and forwards traffic on
the port.
CSCsy91579
A switch no longer randomly resets due to memory corruption.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE1
CSCsb46724
If the connection to a primary AAA server fails, the backup server is now queried for login access.
CSCsr92741
When a TCP packet with all flags set to zero (at the TCP level) is sent to a remote router, the remote
(destination) router no longer returns an ACK/RST packet back to the source of the TCP segment.
CSCsy24510
The switch now accepts an encrypted secret password.