Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(40)SE

18
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(40)SE
460160-001
Resolved Caveats
CSCsj77933
In Cisco IOS Release 12.2(35)SE and Cisco IOS Release 12.2(37)SE, if you enter a space before a
comma in the define interface-range or the interface range global configuration command, the
space before the comma is not saved in the switch configuration.
There is no workaround.
CSCsj87991
A switch configured for Link Layer Discovery Protocol (LLDP) might not correctly report the
enabled switch capabilities in the LLDP type, length, and value (TLV) attributes. System
capabilities appear correctly, but the enabled capabilities are not identified if the switch is
configured only as a Layer 2 switch.
There is no workaround.
Open HP Caveats
These are the HP severity 2 open caveats for this release:
rQm 263546
Disconnecting the cable from the console port does not end a Telnet session. If you are in privileged
EXEC mode when you remove the cable, the next session that is started on the console port will also
be in privileged EXEC mode.
The workaround is to end the session before you remove the cable.
rQm 266129
If you power on a switch that does not have a config.txt file (the factory default file) and leave the
switch on for few hours, the switch console appears to be stalled during setup.
The workaround is to reload the switch before you continue to configure it.
Open Device Manager Caveats
This is the severity 3 device manager caveat for this release:
CSCef94061
If you enter the letter i by itself in the port description, the VLAN status column displays i; this only
occurs when you are using Device Manager through Netscape 7.1.
The workaround is to run Device Manager through Internet Explorer if you must enter a port
description with only the value “i.”
Resolved Caveats
These sections describe the caveats that have been resolved in Cisco IOS Release 12.2.(40)SE:
CSCsg81334
If IEEE 802.1x critical authentication is not enabled and the RADIUS authentication server is
unavailable during MAC authentication bypass (MAB) reauthentication, when the RADIUS server
comes back up, MAB now correctly authenticates previously authenticated clients.