Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-class Release Notes, Cisco IOS Release 12.2(50)SE and later

16
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(50)SE and later
515765-002
Resolved Caveats
CSCta56469
Moving a PC between two IP Phones without disconnecting either phone from the switch no longer
triggers a port-security violation.
CSCta67777
A port security violation error no longer occurs when MAC address sticky learning is enabled on a
port and a CDP is enabled on a connected IP Phone.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE2
CSCsy72726
A switch running 12.2(50)SE or later no longer might unexpectedly restart when Auto Smart Ports
is enabled and the switch is configured for SSH or the HTTP secure server is enabled by entering
the ip http secure-server global configuration command.
CSCsy48370
The switch no longer fails when you use the vacant-message line configuration command.
CSCsz81762
If you enable automatic server testing through the radius-server host ip-address [test username
name] global configuration command, the switch no longer sends requests to the RADIUS server if
the server is not available.
CSCsy91579
A switch no longer randomly resets due to memory corruption.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE1
CSCsb46724
If the connection to a primary AAA server fails, the backup server is now queried for login access.
CSCsr92741
When a TCP packet with all flags set to zero (at the TCP level) is sent to a remote router, the remote
(destination) router no longer returns an ACK/RST packet back to the source of the TCP segment.
CSCsy24510
The switch now accepts an encrypted secret password.
CSCsy41470
The switch no longer runs out of memory when an smnpwalk, snmpget, or snmpbulkwalk is run on
the CISCO-ENERGYWISE-MIB.
Cisco IOS Caveats Resolved in Cisco IOS Release 12.2(50)SE
This section describes the caveats that have been resolved in this release:
CSCee08109
If a port-based ACL (PACL) is applied to an 802.1x-enabled port and the client is then disconnected
from that port, the PACL is now removed from the port.