Cisco Cisco IOS Software Release 12.2(35)SE

Page de 38
 
22
Release Notes for the Catalyst 3750, 3560, and 2970 Switches, Cisco IOS Release 12.2(25)SE
OL-6359-01
Important Notes
(Catalyst 3750) 
When you apply a per-VLAN quality of service (QoS), per-port policer policy-map to a VLAN 
Switched Virtual Interface (SVI), the second-level (child) policy-map in use cannot be re-used by 
another policy-map.
The workaround is to define another policy-map name for the second-level policy-map with the 
same configuration to be used for another policy-map. (CSCef47377)
Device Manager Limitations and Restrictions
This release supports the same switch cluster compatibilities supported in Cisco IOS 
Release 12.1(22)EA1. However, you cannot create and manage switch clusters through the device 
manager. To create and manage switch clusters, use the CLI or the Cisco Network Assistant application. 
For information about Network Assistant, see the 
Important Notes
These sections describe the important notes related to this software release for the Catalyst 3750, 3560, 
and 2970 switches:
Switch Stack Notes
These notes apply to switch stacks:
Always power off a switch before adding or removing it from a switch stack. 
The Catalyst 3560 and 2970 switches do not support switch stacking. However, the show processes 
privileged EXEC command still lists stack-related processes. This occurs because these switches 
share common code with other switches that do support stacking.
Cisco IOS Notes
These notes apply to Cisco IOS software:
The 802.1x feature in Cisco IOS Release 12.1(14)EA1 and later is not fully backward-compatible 
with the same feature in Cisco IOS Release 12.1(11)AX. If you are upgrading a Catalyst 3750 or a 
2970 switch running Cisco IOS Release 12.1(11)AX that has 802.1x configured, you must re-enable 
802.1x after the upgrade by using the dot1x system-auth-control global configuration command. 
This global command does not exist in Cisco IOS Release 12.1(11)AX. Failure to re-enable 802.1x 
weakens security because some hosts can then access the network without authentication.