Cisco Cisco Gigabit Ethernet Switch Module (CGESM) for HP 發佈版本通知
22
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(35)SE and later
459515-002
Documentation Updates
•
CSCse14774
If a switch is connected to a third-party router through an EtherChannel and the EtherChannel is
running in Link Aggregation Control Protocol (LACP) mode, the interfaces in the EtherChannel no
longer fail after you enter the switchport trunk native vlan vlan-id interface configuration
command to change the native VLAN from VLAN 1 (the default) to a different VLAN ID.
running in Link Aggregation Control Protocol (LACP) mode, the interfaces in the EtherChannel no
longer fail after you enter the switchport trunk native vlan vlan-id interface configuration
command to change the native VLAN from VLAN 1 (the default) to a different VLAN ID.
•
CSCsf04754
Multiple Cisco products contain either of two authentication vulnerabilities in the Simple Network
Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when
processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of
network information or may enable an attacker to perform configuration changes to vulnerable
devices. The SNMP server is an optional service that is disabled by default. Only SNMPv3 is
impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the
vulnerabilities described in this document.
Management Protocol version 3 (SNMPv3) feature. These vulnerabilities can be exploited when
processing a malformed SNMPv3 message. These vulnerabilities could allow the disclosure of
network information or may enable an attacker to perform configuration changes to vulnerable
devices. The SNMP server is an optional service that is disabled by default. Only SNMPv3 is
impacted by these vulnerabilities. Workarounds are available for mitigating the impact of the
vulnerabilities described in this document.
The United States Computer Emergency Response Team (US-CERT) has assigned Vulnerability
Note VU#878044 to these vulnerabilities.
Note VU#878044 to these vulnerabilities.
Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-0960 has been assigned to
these vulnerabilities.
these vulnerabilities.
This advisory will be posted at
Documentation Updates
This section provides these updates:
•
•
•
Updates to Software Configuration Guide
This section was added to the “Configuring EtherChannels” chapter:
When you configure one end of an EtherChannel in either PAgP or LACP mode, the system negotiates
with the other end of the channel to determine which ports should become active. In previous releases,
the incompatible ports were suspended. Beginning with Cisco IOS Release 12.2(35)SE, instead of a
suspended state, the local port is put into an independent state and continues to carry data traffic as would
any other single link. The port configuration does not change, but the port does not participate in the
EtherChannel.
with the other end of the channel to determine which ports should become active. In previous releases,
the incompatible ports were suspended. Beginning with Cisco IOS Release 12.2(35)SE, instead of a
suspended state, the local port is put into an independent state and continues to carry data traffic as would
any other single link. The port configuration does not change, but the port does not participate in the
EtherChannel.