Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(52)SE

14
Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(52)SE
OL-19714-01
Limitations and Restrictions
The EtherChannel ports are put in the error-disabled state because the switches in the partitioned
stacks send STP BPDUs. The switch or stack at the other end of the EtherChannel receiving the
multiple BPDUs with different source MAC addresses detects an EtherChannel misconfiguration.
After the partitioned stacks merge, ports in the suspended state should automatically recover.
(CSCse33842)
When a switch stack is configured with a cross-stack EtherChannel, it might transmit duplicate
packets across the EtherChannel when a physical port in the EtherChannel has a link-up or
link-down event. This can occur for a few milliseconds while the switch stack adjusts the
EtherChannel for the new set of active physical ports and can happen when the cross-stack
EtherChannel is configured with either mode ON or LACP. This problem might not occur with all
link-up or link-down events.
No workaround is necessary. The problem corrects itself after the link-up or link-down event.
(CSCse75508)
The switch might display tracebacks similar to this example when an EtherChannel interface
port-channel type changes from Layer 2 to Layer 3 or the reverse:
15:50:11: %COMMON_FIB-4-FIBNULLHWIDB: Missing hwidb for fibhwidb Port-channel1
(ifindex 1632) -Traceback= A585C B881B8 B891CC 2F4F70 5550E8 564EAC 851338 84AF0C
4CEB50 859DF4 A7BF28 A98260 882658 879A58
There is no workaround. (CSCsh12472)
IEEE 802.1x Authentication
If a supplicant using a Marvel Yukon network interface card (NIC) is connected to an
IEEE 802.1x-authorized port in multihost mode, the extra MAC address of 0c00.0000.0000 appears
in the MAC address table.
Use one of these workarounds (CSCsd90495):
Configure the port for single-host mode to prevent the extra MAC address from appearing in the
MAC address table.
Replace the NIC with a new card.
When MAC authentication bypass is configured to use Extensible Authentication Protocol (EAP)
for authorization and critical authentication is configured to assign a critical port to an access
VLAN:
If the connected device is supposed to be unauthorized, the connected device might be
authorized on the VLAN that is assigned to the critical port instead of to a guest VLAN.
If the device is supposed to be authorized, it is authorized on the VLAN that is assigned to the
critical port.
Use one of these workarounds (CSCse04534):
Configure MAC authentication bypass to not use EAP.
Define your network access profiles to not use MAC authentication bypass. For more
information, see the Cisco Access Control Server (ACS) documentation.
When IEEE 802.1x authentication with VLAN assignment is enabled, a CPUHOG message might
appear if the switch is authenticating supplicants in a switch stack.
The workaround is not use the VLAN assignment option. (CSCse22791)