Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later

14
Release Notes for the Cisco Catalyst Blade Switch 3020 for HP, Cisco IOS Release 15.0(2)SE and Later
OL-27324-02
Resolved Caveats
CSCuh51379
When VTp mode is set to transparent and vlan.dat file present in flash is deleted, after reload, access
vlan is not configured in the switch even though vlan configuration is present in running config or
startup config.
The workaround is to set the vtp mode to server or client.
CSCuj81498
The internal port links between 3020 switches and blade servers do not work when you start the
switch and the server with a specific power on and off sequence.
The workaround is to restart the switch.
CSCto13462
In a network that consists of two DHCP clients with same client id and different mac addresses, the
DHCP server reloads when one of the clients releases its DHCP address.
There is no workaround.
CSCts80209
A switch configured with login quiet-mode resets when you enter the login block-for or no login
block-for commands.
There is no workaround. To avoid a reset, do not enter the login block or no login block-for
command.
Caveats Resolved in Cisco IOS Release 15.0(2)SE5
CSCua00661
A memory leak is observed when configuring VLANs using tclsh mode.
The workaround is to make the tclsh mode interactive to avoid any memory leak.
CSCue94252
When the privilege exec level 5 show mac address-table interface gigabitethernet privileged
EXEC command is entered, all interfaces in the switch have the command applied to the running
configuration.
There is no workaround.
CSCug26848
CPU usage goes above 90% when Internet Group Management Protocol (IGMP) version 3 report
packets are sent to the switch which has IGMP version 2 configured on the switch virtual interface.
The workaround is to either disable multicast fast convergence or configure IGMP version 3 on
switch virtual interface.
CSCug51225
Topology Change Notification (TCN) occurs over the network when a new stack member is added
to the switch stack.
There is no workaround
CSCug52714
TACACS+ single connect authentication request from a switch stack takes around 10 to 12 minutes
to failover to secondary server after the primary TACACS server is unreachable.