Cisco Cisco Gigabit Ethernet Switch Module (CGESM) for HP 發佈版本通知

下载
页码 22
 
16
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(25)SEE1 and later
459516-002
Resolved Caveats
Open HP Caveats
These are the HP severity 2 open caveats for this release:
rQm 263546
Disconnecting the cable from the console port does not end a Telnet session. If you are in privileged 
EXEC mode when you remove the cable, the next session that is started on the console port will also 
be in privileged EXEC mode. 
The workaround is to end the session before you remove the cable.
rQm 266129
If you power on a switch that does not have a config.txt file (the factory default file) and leave the 
switch on for few hours, the switch console appears to be stalled during setup. 
The workaround is to reload the switch before you continue to configure it. 
Open Device Manager Caveats
This is the severity 3 device manager caveat for this release:
CSCef94061
If you enter the letter i by itself in the port description, the VLAN status column displays ; this only 
occurs when you are using Device Manager through Netscape 7.1.
The workaround is to run Device Manager through Internet Explorer if you must enter a port 
description with only the value “i.”
Resolved Caveats
These sections describe the resolved caveats for the CGESM switch:
Resolved IOS Caveats in Cisco IOS Release 12.2(25)SEE4
These are the resolved IOS caveats in Cisco IOS Release 12.2(25)SEE4:
CSCsf04754
Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network 
Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when 
processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of 
network information or may enable an attacker to perform configuration changes to vulnerable 
devices. The SNMP server is an optional service that is disabled by default. Only SNMPv3 is 
impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the 
vulnerabilities described in this document.