Cisco Gigabit Ethernet Switch Module for HP p-Class BladeSystem Release Notes, Cisco IOS Release 12.2(25)SED

14
An 802.1x port in single-host mode with port security enabled will no longer go into the errdisable state
and display the %DOT1X-5-SECURITY_VIOLATION message if another MAC is seen.
CSCee37552
The switch no longer fails when it executes the shutdown interface configuration command on an 802.1x
enabled port.
CSCee84918
When DHCP snooping is enabled on the switch, clients attached to an interface move from one subnet to
another, and a client attached to the switch sends a DHCP request to the previous subnet, the DHCP
negative acknowledgement packet is no longer dropped by the switch.
CSCef04854
If you use the no switchport interface configuration command to configure a port as a routed port and
then enable 802.1x on the port by using the dot1x port-control auto interface configuration
command, 802.1x authentication no longer fails if you disable and then re-enable 802.1x on the port.
CSCef09489
The switch now correctly forwards Extensible Authentication Protocol (EAP) messages received from a
RADIUS server to a client with no delay to the client.
CSCef16610
When IP source guard is configured and unconfigured on an interface several times, a memory leak no
longer occurs.
CSCef42734
When a new 802.1x session is started, the switch now purges old state information, which prevents the
switch from failing to authenticate due to stale State(24) field values.
CSCef55486
When the 802.1x accounting feature is configured, the switch no longer loses connectivity to the RADIUS
server for an extended period of time, 802.1x transactions no longer time out, and switch reloads no
longer occur.
CSCef65587
These error messages no longer appear randomly:
%SYS-2-NOBLOCK: idle with blocking disabled. -Process= “hpm main process”,
ipl= 0, pid= 62
-Traceback= 259CC0 251438 750244 661220 665774 6603CC 653750 6575B0 64FC44
651260 65DF58 4EC268 544300 4F5F64 4B433C 522508
*Sep 2 15:42:22: %SYS-2-BLOCKHUNG: Task hung with blocking disabled, value =
0x1. -Process= "hpm main process", ipl= 0, pid= 62
-Traceback= 259CFC 251438 750244 661220 665774 6603CC 653750 6575B0 64FC44
651260 65DF58 4EC268 544300 4F5F64 4B433C 522508
CSCef78853
Entering certain characters in some menu items in the device manager window could cause the front panel
of a switch to not appear or error dialogs to appear. This situation occurred when a semicolon (;), single
quotation mark (‘), or double quotation mark (“) was used as part of the hostname, port description, SNMP
system location, SNMP system contact, SNMP community strings, Telnet password, or switch password.
CSCei61732
Cisco IOS may permit arbitrary code execution after exploitation of a heap-based buffer overflow
vulnerability. Cisco has included additional integrity checks in its software, as further described below, that
are intended to reduce the likelihood of arbitrary code execution.
Cisco has made free software available that includes the additional integrity checks for affected customers.
This advisory is posted at http://www.cisco.com/warp/public/707/cisco-sa-20051102-timers.shtml.
CSCei76358
Through normal software maintenance processes, Cisco is removing deprecated functionality. These
changes have no impact on system operation or feature availability.
CSCsb75533
A switch running Cisco IOS release 12.2(25)SEB1 and a vendor type of “cevPortGigBaseLX” now displays
the SNMP table “entAliasMappingTable”.