Release Notes

4) RADIUS server, when so configured, sends request to a secure authentication
server
5) The server in turn sends back access-challenge with state information and
challenge reply information
6) Switch receives response and displays a challenge screen to the user with
the challenge reply information and gets a response from the user
7) The user's original username and the new response are then sent to the
RADIUS server in a new access request.
8) The access request then goes through the same validation process as in
step 4 on, and may get more challenges, or access accept/reject
RADIUS Password Fallback (Q00604265):
It is now possible to access the switch using a fallback password if the RADIUS
servers are down or unavailable.
KNOWN ISSUES:
=============
If you are remotely telneting to a switch and accessing the Port Configuration
page and the network connection is lost before the telnet session times out, you
will not be able to access the Port Configuration page locally through a console
terminal. To workaround this issue, set the telnet time-out value to less than
10 minutes.
The CR fix for Q00585849 only applies to a pure stack of BPS2000's and an allied
stack (BPS2000 and BS470). In a mixed (BPS2000 and BS450), the issue is still
reproducible.
Q00691669: While staging unit replacement, can't change Target Unit with 2 opened
telent sessions.
Q00696227: While staging unit replacement, Clear Target on renumber screen works
only on the base unit.
Q00692114: IP address on the ping field only displays on unit 1 of allied stack.
---------------------------------------------------------------------------------
(c) 2003 Nortel Networks Incorporated. All rights reserved.