Cisco Cisco Gigabit Ethernet Switch Module (CGESM) for HP
16
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(46)SE
501396-001
Resolved Caveats
Open Device Manager Caveats
This is the severity 3 device manager caveat for this release:
•
CSCef94061
If you enter the letter i by itself in the port description, the VLAN status column displays i; this only
occurs when you are using Device Manager through Netscape 7.1.
occurs when you are using Device Manager through Netscape 7.1.
The workaround is to run Device Manager through Internet Explorer if you must enter a port
description with only the value “i.”
description with only the value “i.”
Resolved Caveats
This section describes the caveats that have been resolved in this release:
•
CSCin91851, CSCsh42013, and CSCsh42316
The SSH Protocol now supports generic message authentication and is compliant with RFC 4256.
•
CSCsi70454
The configuration file used for the configuration replacement feature no longer requires the
character string end\n at the end of the file.
character string end\n at the end of the file.
•
CSCsj74022
The switch now correctly updates the entPhysicalChildIndex objects from the ENTITY-MIB, and
all of the entPhysicalChildIndex entries appear in the table.
all of the entPhysicalChildIndex entries appear in the table.
•
CSCsr55949
When IEEE 802.1x is enabled on the switch, EAP notification packets are no longer dropped.
Documentation Updates
This section provides updates to the product documentation:
•
•
Update to the Software Configuration Guide
This text was updated in the “Using IEEE 802.1x Authentication with Guest VLAN section of the
software configuration guide:
software configuration guide:
If the switch is trying to authorize an IEEE 802.1x-capable voice device and the AAA server is
unavailable, the authorization attempt fails, but the detection of the EAPOL packet is saved in the
EAPOL history. When the AAA server becomes available, the switch authorizes the voice device.
However, the switch no longer allows other devices access to the guest VLAN. To prevent this situation,
use one of these command sequences:
unavailable, the authorization attempt fails, but the detection of the EAPOL packet is saved in the
EAPOL history. When the AAA server becomes available, the switch authorizes the voice device.
However, the switch no longer allows other devices access to the guest VLAN. To prevent this situation,
use one of these command sequences:
•
Enter the dot1x guest-vlan supplicant global configuration command to allow access to the guest
VLAN.
VLAN.