Enterasys SecureStack C2 C2K122-24 Release Note Download Page 11

 

 

 

CUSTOMER RELEASE NOTES

 

 

08/13/2008   P/N: 9038155-52 

Subject to Change Without Notice 

Page: 11

 

of 41 

 
F0615-O

                             

Changes and Enhancements in 5.01.01.0039

 

When configuring multiple RADIUS servers on the SecureStack, the RADIUS index will be used to determine 
the sequencing of which RADIUS server the RADIUS Access Request packets will be sent to when a client 
attempts to authenticate. 
Users now have the ability to set objects via name for RMON Alarms, such as ―set rmon alarm properties 1 
object ifOperStatus.1‖. 
A static LAG between multiple units of a SecureStack switch and a Cisco 2950 switch will now recover after a 
"set switch movemanagement" command is executed. 
Static ARP entries are preserved  across resets. 
Corrected an IP assignment issue that occurred when more than one user authenticated via 802.1X from the 
same computer and was assigned to a different VLAN. 
RMON Packet capture now displays bidirectional traffic. 
When using policies with the untagged-vlan option, the VLAN egress will now be properly assigned when the 
policy is applied. 
Corrects an issue with multiauth, where after an extended period time users trying to authenticate on the 
network get stuck in a connecting state and were unable to gain network access.  
The "show mac" and "show arp" commands will continue to reflect accurate information on all physical ports 
which have MAC Authentication enabled. 
Corrected an issue in SNTP that prevented time synchronization to a broadcast SNTP server. 
When polling the dot1dStpVersion oid, it will return the proper value for the Spanning Tree version configured 
on the stack. 
Resolved an issue where after rebooting a PC and re-

authenticating, user‘s ports were not being assigned the 

appropriate policy.   
Values for the MIB-2 counters will remain persistent regardless of link state. 
The SecureStack will cease sending SNTP requests to SNTP servers which have been removed from the 
device configuration.  
User configured forbidden egress settings will remain persistent in the device configuration and take 
precedence over dynamic VLAN assignments learned via GVRP. 
Implemented dynamic rule allocation based on Policy type to manage policy resources. 
The node alias create time information is now measured in Ticks as defined in the MIBs for ctAliasTimeFilter 
and ctAliasMacAddressTime. 
Corrected an issue where the ―show mac type self‖ command would not use the default of all ports when a port 
string was not entered. 
When polling the dot1dTpFdbPort MIB, the results will be returned in ascending order. 
Logging commands will remain persistent after executing the ―set switch movemanagement‖ command. 

The RADIUS Filter-ID case is no longer case sensitive. 

Configuring a metric for a static route is now supported. 

Resolved an issue with the C2H124-48 which prevented tagged traffic from being routed across static routes. 

Corrected a display issue in t

he format of the ―show ip ospf database‖ command. 

When configuring symmetrical VRRP for load balancing such that the interface on a VLAN is master for one 
instance and backup for another instance of VRRP, the display of the ―show ip vrrp‖ command will now 
accurately reflect the correct VLAN ID for both instances.  
ACLs applied to VLAN 1 will now be added to the device configuration. 
Modified the VRRP application‘s behavior during the SecureStack bootup process to strengthen the protocol‘s 
stability. 
The 

switch ―clear arp all‖ and router ―clear arp-cache‖ commands will clear all dynamic ARP entries. 

Corrected an issue in authentication that would prevent routed frames from being forwarded. 
Administrators can contact and manage their SecureStack switch using a VRRP virtual IP address if the device 
is the owner and Master of the virtual IP. 
Resolved an issue where in certain OSPF configurations an interface would never reach a full adjacency and 
remain stuck in ―Exchange Start‖ state. 

Summary of Contents for SecureStack C2 C2K122-24

Page 1: ...7 Maintenance Release August 2008 Previous Version 5 01 06 0006 Maintenance Release August 2008 Previous Version 5 01 05 0004 Maintenance Release July 2008 Previous Version 5 01 04 0001 Maintenance Re...

Page 2: ...evious Version 2 01 37 Customer Release April 2005 Previous Version 2 01 26 Customer Release March 2005 Previous Version 2 01 24 Customer Release March 2005 Previous Version 2 01 22 Customer Release M...

Page 3: ...entication CoS Inbound Rate Limiting in mixed C2 C3 stacks LLDP L2 Policy rules in mixed C2 C3 stacks Link Flap Detection 802 1X IP Phone Authentication Per Port Broadcast Suppression Non Strict 802 1...

Page 4: ...uide contact your Enterasys representative Please refer to http www enterasys com download download cgi lib c2 and choose the archive link to view information on changes previous to the release inform...

Page 5: ...ed before issuing a reset units not updated will need to be removed from the stack and upgraded individually To upgrade to Release 3 it is highly recommended that you first upgrade to the latest Relea...

Page 6: ...anges and Enhancements in 5 01 06 0006 10690 Corrected an issue where the flowcontrol pause packets were transmitted too early leading to packet loss 10704 Corrected an issue whereby running macauth a...

Page 7: ...mplementation that could result in the loss of SNMP management or high CPU utilization 10396 Corrected an issue whereby after an initial invalid RADIUS request fails subsequent valid requests were rej...

Page 8: ...capability on combo ports Corrected an issue where high rates of multicast traffic caused pause frames to be generated on the upper ports 25 48 of 48 port devices Corrected an issue with the RADIUS re...

Page 9: ...ast traffic See Appendix A of the Release Notes for configuration information Added SMON MIB support for management of Port Mirroring See Appendix A of the Release Notes for configuration information...

Page 10: ...r VLAN egress configuration Resolved an issue with policy where in certain configurations port policy assignments weren t being removed properly Fix an issue with policy based inbound rate limiting wh...

Page 11: ...sending SNTP requests to SNTP servers which have been removed from the device configuration User configured forbidden egress settings will remain persistent in the device configuration and take prece...

Page 12: ...n processing an invalid policy role received from RADIUS The switch now applies the default port role where previously the existing port role was unchanged Corrected a display issue where the operatio...

Page 13: ...ssue that prevented SSH logout when the logout timer expired Corrected a display issue in CLI help for set ssh and set switch commands Corrected a firmware upgrade issue on Fast Ethernet boards that c...

Page 14: ...an SNMP V3 group name created with 2 words encased in quotes would not have the quotes saved in the show config outfile Corrected issue first introduced in release 5 00 69 that could prevent communic...

Page 15: ...tries in the forwarding database as well as disable the physical Ethernet link The set switch description command used to rename member units in the stack is now supported When upgrading the SecureSta...

Page 16: ...role limitation of 100 rules and 10 masks 2 A system limitation of 768 unique rules 3 No DA SA or Ethertype rules 4 Maximum of 15 roles 5 No metering The C3 product should be the master when mixing wi...

Page 17: ...panel ports degrading the rate at which traffic could traverse the CPU When executing a set show or clear VLAN command on a list of VLANs the VLANs can be listed in either ascending or descending orde...

Page 18: ...oup leaves the group its entry will now be correctly aged out of the multicast forwarding database Flow Control Pause packets are now managed appropriately by the SecureStack C2 switch When executing...

Page 19: ...ers now have the ability to remove a specific sid from an MSTI via the CLI An 802 1X authentication PEAP username will allow a maximum of 63 characters If a local routed VLAN interface is configured a...

Page 20: ...suffers from a power system failure the system will now send trap from the etsysPsePowerNotification MIB which can be correctly decoded by NetSight Console Changes and Enhancements in 3 02 32 When a...

Page 21: ...so when the device is upgraded or has a saved configuration loaded onto it the default logging facility will be correctly programmed A problem has been addressed where use of the Automated Security Ma...

Page 22: ...ver If the authentication attempt fails the port will wait until quiet period expires and then remove the MAC address from FDB The device will then take the next MAC address received on the port and r...

Page 23: ...a regular RIP update when redistribution of static routes is enabled Policy profiles configured for VLANs 1 4093 are now supported If one of these profiles is matched the traffic will be marked appro...

Page 24: ...is release so only packets matching the specific criteria specified will be affected by the rule If a user creates a port mirror and then deletes the port mirror this will no longer cause the device t...

Page 25: ...addresses to scroll across the screen The set policy rule 1 port command is not supported and has been removed in this release An issue has been resolved in this release where when executing the comm...

Page 26: ...solved A problem where the Spanning Tree LAG adminpathcost to be ignored after reset has been resolved A problem where the ARP cache would not update when a new ISL port becomes active has been resolv...

Page 27: ...ally but disabled on all ports by default It is recommended that users enable GVRP on inter switch links ISLs and leave it disabled on all other edge ports within the stack Large numbers of ports with...

Page 28: ...f port advertised capability on Combo ports is not persistent When a VLAN tunnel is applied traffic is egressed untagged as expected Show vlanauthorization will display the correct VLAN and MAC addres...

Page 29: ...trigger at each interval even if traffic rates do not exceed the threshold Additionally the RMON Alarm appears to be using the Falling Threshold as the interval instead of using the actual interval o...

Page 30: ...ded when GVRP disabled Packets less than 64 bytes or greater than 1518 will not be counted by IfInErrors MIB When a user has multiauth configured and two authenticated users on a port the etsysMultiAu...

Page 31: ...a time o There are only three Filter Entries available and a user can associate all three Filter Entries with the Channel Entry Configured channel filter and buffer information will be saved across r...

Page 32: ...s Setting an extensive number of policy rules via the CLI can cause momentary loss of CLI and SNMP management The Policy functionality can only assign ports to VLANs which have been statically created...

Page 33: ...t code and then reload the saved configuration onto the device Note that you will not be able to do this remotely unless you have remote console support If a user telnets to another device from the C2...

Page 34: ...m image the device will not prompt the user to save changes or warn the user that changes will be lost Before executing the set switch movemanagment command the user should execute the save config fil...

Page 35: ...age onto all units whose image does not match the manager The stack must then be reset once this command has finished executing for the command to take effect If there is an image mismatch or configur...

Page 36: ...on information for all units in the stack Some units may be omitted from the displayed results For the most up to date information concerning known issues go to the Global Knowledgebase section at htt...

Page 37: ...gementMIB etsysMACLockingMIB etsysSnmpPersistenceMIB etsysMstpMIB etsysMACAuthenticationMIB etsysletfBridgeMibExtMIB etsysMultiAuthMIB etsysSntpClientMIB etsysIeee8023LagMibExtMIB etsysVlanAuthorizati...

Page 38: ...Termination Action RFC 2865 RFC 3580 Tunnel Attributes RFC 2867 RFC 2868 RFC 3580 User Name RFC 2865 RFC 3580 RADIUS Accounting Attributes Attribute RFC Source Acct Session Id RFC 2866 Acct Terminate...

Page 39: ...values for group can range from 0 to 7 Valid values for port type can range from 0 to 1 although only port type 0 is currently supported For example port group 1 would be specified as 1 0 rate Specifi...

Page 40: ...d enable a port mirroring instance 1 Open a MIB browser such as Netsight MIB Tools 2 In the MIB directory tree navigate to the portCopyEntry folder and expand it 3 Select the portCopyStatus MIB 4 Ente...

Page 41: ...ance enter MIB option 1 active and perform an SNMP Set operation 5 Optional Use the CLI to verify the port mirroring instance has been enabled To delete a port mirroring instance 1 Select a previously...

Reviews: