Cisco Cisco IOS Software Release 12.2(35)SE

Page de 50
 
38
Release Notes for the Catalyst 3750, 3560, 2970, and 2960 Switches, Cisco IOS Release 12.2(25)SEE
OL-8556-01
Resolved Caveats
Port security and 802.1x are enabled on a port.
A supplicant is authenticated.
An IEEE 802.1x VLAN assignment, such as guest VLAN, restricted VLAN, or RADIUS 
assigned VLAN, has occurred.
There is no workaround. The error message is informational only and does not affect switch 
functionality.
CSCsd16908 
If you globally disable IEEE 802.1x authentication by using the no dot1x system-auth-control 
global configuration command and if the dot1x port-control auto or the dot1x port-control 
force-unauthorized
 interface configuration command was previously entered, the dot1x 
port-control auto
 or the dot1x port-control force-unauthorized interface configuration command 
takes effect, and the host cannot access the port. 
The workaround is to enter the no dot1x port-control interface configuration command to return to 
the default setting of force-authorized.
CSCsd17229 (Catalyst 3750 switches only) 
After a switch stack is reloaded, SFP-module info such as the serial number or type might not appear in 
the entPhysicalTable (ENTITY-MIB). 
These are the workarounds (you must do one of these): 
Reboot the master switch and then reboot the slave switches. 
Remove and then reinsert the SFP module.
Resolved Caveats
This section describes the caveats have been resolved in this release. Unless otherwise noted, these 
resolved caveats apply to the Catalyst 3750, 3560,and 2970, and 2960 switches and the Cisco 
EtherSwitch service modules:
CSCeg09032 
Open Shortest Path First (OSPF) routes now appear in the routing table after a topology change 
when Incremental SPF (iSPF) is enabled.
CSCeg21451
When a non powered Cisco IP Phone is connected to a switch that does not provide inline power, 
the interface no longer comes up when the down-when-looped interface configuration command is 
configured.
CSCek26492
Symptoms: A router may crash if it receives a packet with a specific crafted IP option as detailed in 
Cisco Security Advisory: Crafted IP Option Vulnerability:
Conditions: This DDTS resolves a symptom of CSCec71950. Cisco IOS with this specific DDTS 
are not at risk of crash if CSCec71950 has been resolved in the software.
Workaround: Cisco IOS versions with the fix for CSCec71950 are not at risk for this issue and no 
workaround is required. If CSCec71950 is not resolved, see the following Cisco Security Advisory: 
Crafted IP Option Vulnerability for workaround information:
http://www.cisco.com/warp/public/707/cisco-sa-20070124-crafted-ip-option.shtml