Enterasys SecureStack C2 C2K122-24 Release Note Download Page 21

 

 

 

CUSTOMER RELEASE NOTES

 

 

08/13/2008   P/N: 9038155-52 

Subject to Change Without Notice 

Page: 21

 

of 41 

 
F0615-O

                             

Changes and Enhancements in 3.02.32 

The ―exclude‖ parameter of the command ―set SNMP view‖ will now correctly limit the device MIB subtrees which 
can be accessed by an SNMP user. 
An issue has been resolved which previously prevented administrators from configuring port mirroring on 
C2H124-48 units for ports greater than port 24. 
Support has been added for port alias which allows users to configure their 

own unique text ―alias‖ for different 

ports on the device. 
When 802.1X is enabled at the device level, if you change the port mode from ―force-auth‖ to ―auto‖, the 
dot1xAuthPaeState will correctly change from ―forceauth‖ to ―Initialize‖. 
When a user has been authenticated successfully via 802.1X on a port, the dot1xAuthPaeState is now set to 
―Authenticated(5)‖. 
When the ifInDiscards OID is queried, the switch will now return accurate data. The ifOutQLen and ifSpecific 
OIDs have been deprecated and will not be supported. 
When setting up an SNMP view, the device can now handle any referenced subtree OID which contains more 
than a single octet.  
When configuring MAC locking, after locking the first arrival address, if the user enters the command ―show 
macl

ock <port>‖, the first arrival address will no longer be shown as a violating address. 

When restoring the config on a C2 device with SNMPv3 using NetSight Inventory Manager, the Inventory 
Manager can now reestablish contact with the device after the reset following the restore operation without 
added assistance.   
The C2 now has support for specifying precedence values when configuring multiple SNTP servers. 
Earlier versions of code had saved configured default logging facility settings as invalid values. This image will 
recognize both these invalid values and the correct values, so when the device is upgraded or has a saved 
configuration loaded onto it, the default logging facility will be correctly programmed.  
A problem has been addressed where use of 

the Automated Security Manager ―Undo‖ button could lead to a 

user not being able to authenticate to a fully functional role. 
A corner case issue has been resolved where in certain configurations a newly created VLAN would not forward 
traffic until the switch was rebooted. 
Settings made to the ctAlias MIB will now be reflected correctly in the CLI.  
A problem has been addressed where if a user misconfigured a LAG with the same admin key going to different 
switches, a LAG was incorrectly formed. 
MAC authenticated users who are assigned to a VLAN containing a locally configured router interface will no 
longer cause the routed interface to change to a down state.  
RADIUS access request packets will now contain the correct NAS-IP-Address and NAS-Port-Id information. 
If a directly connected RIP interface looses link, the router can now learn alternative routes to the network 
through its other RIP interfaces. 
If a C2 is acting as a switch in a VRRP network and the VRRP master moves to another port, the C2 will 
correctly update its tables with this information.  

 

Changes and Enhancements in 3.01.91 

When an 802.1X authenticated user logs off of their PC, the C2 will now send an EAP end frame which correctly 
terminates the 802.1X session. 

 

Changes and Enhancements in 3.01.90 

If IGMP snooping is enabled in an L2 environment, with a multicast server and client on a VLAN, the traffic will 
only be directed to those clients on the VLAN who have requested to join the stream. 
When MAC authentication is enabled on a port, any MAC addresses which had been previously learned on the 
port by the FDB will be removed, and will have to be relearned.  
MAC authenticated sessions are no longer deleted if the MAC entry ages out. MAC authenticated sessions will 
only be removed on link down. 
Setting the port MAC authentication quiet period is now supported via the CLI.  

Summary of Contents for SecureStack C2 C2K122-24

Page 1: ...7 Maintenance Release August 2008 Previous Version 5 01 06 0006 Maintenance Release August 2008 Previous Version 5 01 05 0004 Maintenance Release July 2008 Previous Version 5 01 04 0001 Maintenance Re...

Page 2: ...evious Version 2 01 37 Customer Release April 2005 Previous Version 2 01 26 Customer Release March 2005 Previous Version 2 01 24 Customer Release March 2005 Previous Version 2 01 22 Customer Release M...

Page 3: ...entication CoS Inbound Rate Limiting in mixed C2 C3 stacks LLDP L2 Policy rules in mixed C2 C3 stacks Link Flap Detection 802 1X IP Phone Authentication Per Port Broadcast Suppression Non Strict 802 1...

Page 4: ...uide contact your Enterasys representative Please refer to http www enterasys com download download cgi lib c2 and choose the archive link to view information on changes previous to the release inform...

Page 5: ...ed before issuing a reset units not updated will need to be removed from the stack and upgraded individually To upgrade to Release 3 it is highly recommended that you first upgrade to the latest Relea...

Page 6: ...anges and Enhancements in 5 01 06 0006 10690 Corrected an issue where the flowcontrol pause packets were transmitted too early leading to packet loss 10704 Corrected an issue whereby running macauth a...

Page 7: ...mplementation that could result in the loss of SNMP management or high CPU utilization 10396 Corrected an issue whereby after an initial invalid RADIUS request fails subsequent valid requests were rej...

Page 8: ...capability on combo ports Corrected an issue where high rates of multicast traffic caused pause frames to be generated on the upper ports 25 48 of 48 port devices Corrected an issue with the RADIUS re...

Page 9: ...ast traffic See Appendix A of the Release Notes for configuration information Added SMON MIB support for management of Port Mirroring See Appendix A of the Release Notes for configuration information...

Page 10: ...r VLAN egress configuration Resolved an issue with policy where in certain configurations port policy assignments weren t being removed properly Fix an issue with policy based inbound rate limiting wh...

Page 11: ...sending SNTP requests to SNTP servers which have been removed from the device configuration User configured forbidden egress settings will remain persistent in the device configuration and take prece...

Page 12: ...n processing an invalid policy role received from RADIUS The switch now applies the default port role where previously the existing port role was unchanged Corrected a display issue where the operatio...

Page 13: ...ssue that prevented SSH logout when the logout timer expired Corrected a display issue in CLI help for set ssh and set switch commands Corrected a firmware upgrade issue on Fast Ethernet boards that c...

Page 14: ...an SNMP V3 group name created with 2 words encased in quotes would not have the quotes saved in the show config outfile Corrected issue first introduced in release 5 00 69 that could prevent communic...

Page 15: ...tries in the forwarding database as well as disable the physical Ethernet link The set switch description command used to rename member units in the stack is now supported When upgrading the SecureSta...

Page 16: ...role limitation of 100 rules and 10 masks 2 A system limitation of 768 unique rules 3 No DA SA or Ethertype rules 4 Maximum of 15 roles 5 No metering The C3 product should be the master when mixing wi...

Page 17: ...panel ports degrading the rate at which traffic could traverse the CPU When executing a set show or clear VLAN command on a list of VLANs the VLANs can be listed in either ascending or descending orde...

Page 18: ...oup leaves the group its entry will now be correctly aged out of the multicast forwarding database Flow Control Pause packets are now managed appropriately by the SecureStack C2 switch When executing...

Page 19: ...ers now have the ability to remove a specific sid from an MSTI via the CLI An 802 1X authentication PEAP username will allow a maximum of 63 characters If a local routed VLAN interface is configured a...

Page 20: ...suffers from a power system failure the system will now send trap from the etsysPsePowerNotification MIB which can be correctly decoded by NetSight Console Changes and Enhancements in 3 02 32 When a...

Page 21: ...so when the device is upgraded or has a saved configuration loaded onto it the default logging facility will be correctly programmed A problem has been addressed where use of the Automated Security Ma...

Page 22: ...ver If the authentication attempt fails the port will wait until quiet period expires and then remove the MAC address from FDB The device will then take the next MAC address received on the port and r...

Page 23: ...a regular RIP update when redistribution of static routes is enabled Policy profiles configured for VLANs 1 4093 are now supported If one of these profiles is matched the traffic will be marked appro...

Page 24: ...is release so only packets matching the specific criteria specified will be affected by the rule If a user creates a port mirror and then deletes the port mirror this will no longer cause the device t...

Page 25: ...addresses to scroll across the screen The set policy rule 1 port command is not supported and has been removed in this release An issue has been resolved in this release where when executing the comm...

Page 26: ...solved A problem where the Spanning Tree LAG adminpathcost to be ignored after reset has been resolved A problem where the ARP cache would not update when a new ISL port becomes active has been resolv...

Page 27: ...ally but disabled on all ports by default It is recommended that users enable GVRP on inter switch links ISLs and leave it disabled on all other edge ports within the stack Large numbers of ports with...

Page 28: ...f port advertised capability on Combo ports is not persistent When a VLAN tunnel is applied traffic is egressed untagged as expected Show vlanauthorization will display the correct VLAN and MAC addres...

Page 29: ...trigger at each interval even if traffic rates do not exceed the threshold Additionally the RMON Alarm appears to be using the Falling Threshold as the interval instead of using the actual interval o...

Page 30: ...ded when GVRP disabled Packets less than 64 bytes or greater than 1518 will not be counted by IfInErrors MIB When a user has multiauth configured and two authenticated users on a port the etsysMultiAu...

Page 31: ...a time o There are only three Filter Entries available and a user can associate all three Filter Entries with the Channel Entry Configured channel filter and buffer information will be saved across r...

Page 32: ...s Setting an extensive number of policy rules via the CLI can cause momentary loss of CLI and SNMP management The Policy functionality can only assign ports to VLANs which have been statically created...

Page 33: ...t code and then reload the saved configuration onto the device Note that you will not be able to do this remotely unless you have remote console support If a user telnets to another device from the C2...

Page 34: ...m image the device will not prompt the user to save changes or warn the user that changes will be lost Before executing the set switch movemanagment command the user should execute the save config fil...

Page 35: ...age onto all units whose image does not match the manager The stack must then be reset once this command has finished executing for the command to take effect If there is an image mismatch or configur...

Page 36: ...on information for all units in the stack Some units may be omitted from the displayed results For the most up to date information concerning known issues go to the Global Knowledgebase section at htt...

Page 37: ...gementMIB etsysMACLockingMIB etsysSnmpPersistenceMIB etsysMstpMIB etsysMACAuthenticationMIB etsysletfBridgeMibExtMIB etsysMultiAuthMIB etsysSntpClientMIB etsysIeee8023LagMibExtMIB etsysVlanAuthorizati...

Page 38: ...Termination Action RFC 2865 RFC 3580 Tunnel Attributes RFC 2867 RFC 2868 RFC 3580 User Name RFC 2865 RFC 3580 RADIUS Accounting Attributes Attribute RFC Source Acct Session Id RFC 2866 Acct Terminate...

Page 39: ...values for group can range from 0 to 7 Valid values for port type can range from 0 to 1 although only port type 0 is currently supported For example port group 1 would be specified as 1 0 rate Specifi...

Page 40: ...d enable a port mirroring instance 1 Open a MIB browser such as Netsight MIB Tools 2 In the MIB directory tree navigate to the portCopyEntry folder and expand it 3 Select the portCopyStatus MIB 4 Ente...

Page 41: ...ance enter MIB option 1 active and perform an SNMP Set operation 5 Optional Use the CLI to verify the port mirroring instance has been enabled To delete a port mirroring instance 1 Select a previously...

Reviews: