Cisco Gigabit Ethernet Switch Module for HPBladeSystem p-Class Release Notes, CiscoIOSRelease12.2(35)SE and later

16
Cisco Gigabit Ethernet Switch Module for HP BladeSystem p-Class Release Notes, Cisco IOS Release 12.2(35)SE and later
459515-002
Open Caveats
CSCsg18176
When dynamic ARP inspection is enabled and IP validation is disabled, the switch drops ARP
requests that have a source address of 0.0.0.0.
The workaround is to configure an ARP access control list (ACL) that permits IP packets with a
source IP address of 0.0.0.0 (and any MAC) address) and apply the ARP ACL to the desired DAI
VLANs.
CSCsg21537
When MAC addresses are learned on an Etherchannel port, the addresses are incorrectly deleted
from the MAC address table even when the MAC address table aging timeout value is configured to
be longer than the ARP timeout value. This causes intermittent unicast packet flooding in the
network.
The MAC address is automatically relearned after the ARP refresh. The workaround is to enter the
ping ip address privileged EXEC command from the switch to the next hop router to avoid the
intermittent flooding.
CSCsg30295
When you configure an IP address on a switch virtual interface (SVI) with DCHP and enable DHCP
snooping on the SVI VLAN, the switch SVI cannot obtain an IP address.
The workaround is to not enable DCHP snooping on the SVI VLAN or to use a static IP address for
the SVI.
CSCsg79506
During repeated reauthentication of supplicants on an IEEE 802.1x-enabled switch, if the RADIUS
server is repeatedly going out of service and then coming back up, the available switch memory
might deplete over time, eventually causing the switch to shut down.
There is no work-around, except to ensure that the RADIUS server is stable.
CSCsg81334
If IEEE 802.1x critical authentication is not enabled and the RADIUS authentication server is
temporarily unavailable during a reauthentication, when the RADIUS server comes back up, MAC
authentication bypass (MAB) does not authenticate a previously authenticated client.
The workaround is to enter the shutdown interface configuration command followed by the no
shutdown command on the port connected to the client. An alternative, to prevent the problem from
occurring, is to enable critical authentication by entering the dot1x critical {eapol | recovery delay
milliseconds} global configuration command.
Open HP Caveats
These are the HP severity 2 open caveats for this release:
rQm 263546
Disconnecting the cable from the console port does not end a Telnet session. If you are in privileged
EXEC mode when you remove the cable, the next session that is started on the console port will also
be in privileged EXEC mode.
The workaround is to end the session before you remove the cable.