Enterasys SecureStack C2 C2K122-24 Release Note Download Page 22

 

 

 

CUSTOMER RELEASE NOTES

 

 

08/13/2008   P/N: 9038155-52 

Subject to Change Without Notice 

Page: 22

 

of 41 

 
F0615-O

                             

Changes and Enhancements in 3.01.90 

A variety of enhancements have been made to MAC authentication. MAC authentication can be configured as a 
single user per port or in ―piggy-back‖ mode where once an initial user is authenticated, multiple users can share 
the same port and policy assignment assigned to the port. In either implementation, the user can configure the 
port to have a default policy for unauthenticated users or define no default policy essentially locking any users off 
the port until they are authenticated. These four possible configurations are explained in more detail below: 

 

 

MAC authentication, Single User mode, no piggy-back: 
This requires no configuration change for existing implementations.   

 

o

 

No default policy applied 
Traffic will not be forwarded until the MAC address is authenticated. If the authentication attempt of 
the first MAC address received on the port fails, the port will wait for the quiet period to expire before 
sending the next MAC address received to the RADIUS server for authentication.   

 

o

 

Default policy is applied 
Traffic will be forwarded per the default policy. Any MAC address received on the port will be added 
to the filter database (FDB). An authentication request for this MAC address will then be sent to the 
RADIUS server. If the authentication attempt fails, the device will delete the MAC address from the 
FDB, and repeat the process with the next MAC address received on the port. 

 

 

MAC auth Single User mode, with piggy-back 
MAC Locking 

must

 be enabled on the port. The user can limit the maximum number of addresses that 

can be learned on the port using the first arrival setting. 

 

o

  No default policy applied 

There will be no traffic forwarded on the port until a MAC address is authenticated. When the first 
MAC address is received on the port, a request will be sent to the RADIUS server. If the 
authentication attempt fails, the port will wait until quiet period expires and then remove the MAC 
address from FDB. The device will then take the next MAC address received on the port and restart 
the process. Once one MAC address is authenticated on the port, additional MAC addresses can be 
added to FDB without going through the authentication process up to the configured firstarrival 
setting (default 600 per port). 

 

o

 

Default policy is applied 
Traffic will be forwarded on the port per the default policy until a MAC address on this port has been 
authenticated. When the first MAC address is received on the port it will be added to the FDB, and a 
request will be sent to the RADIUS server. If the authentication attempt fails, the device will wait until 
the quiet period expires, and will then repeat this process using the next MAC address it finds in the 
FDB for this port. Once one MAC address is authenticated on the port, additional MAC addresses 
can be added to FDB without going through the authentication process up to the configured 
firstarrival setting (default 600 per port). 

The SecureStack C2 will now accept DVMRP Graft packets which contain either a source IP host or Source IP 
Network. 

 

The device now supports the ability to hardset mini-GBIC ports to forced 1000 mbps. To force 1000 on an SFP 
module, disable auto-negotiation for that port (or combo-port). In that state, fixed RJ45 copper ports (if they are 
combo ports) behave as expected (you can force them to 10 or 100 Mbps, full or half duplex). If an SFP module 
is present, the port is automatically set to forced 1000 mbps, full duplex, ―master‖. 

 

Changes and Enhancements in 3.01.80 

If a link is established between a C2G124-xx and a C2H124-xx using an MGBIC MT-01, and the C2H124-xx is 
reset, the link will correctly be reestablished when the C2H124-xx comes back online. 
Saved configurations which contain user-defined SNMPv3 users, will now be correctly loaded when applying the 
configuration to the device.  
The buffer management scheme has been modified to allow a single port to use more of the common buffer 
pool.

 

PWA will now work correctly in a routed environment. 

Summary of Contents for SecureStack C2 C2K122-24

Page 1: ...7 Maintenance Release August 2008 Previous Version 5 01 06 0006 Maintenance Release August 2008 Previous Version 5 01 05 0004 Maintenance Release July 2008 Previous Version 5 01 04 0001 Maintenance Re...

Page 2: ...evious Version 2 01 37 Customer Release April 2005 Previous Version 2 01 26 Customer Release March 2005 Previous Version 2 01 24 Customer Release March 2005 Previous Version 2 01 22 Customer Release M...

Page 3: ...entication CoS Inbound Rate Limiting in mixed C2 C3 stacks LLDP L2 Policy rules in mixed C2 C3 stacks Link Flap Detection 802 1X IP Phone Authentication Per Port Broadcast Suppression Non Strict 802 1...

Page 4: ...uide contact your Enterasys representative Please refer to http www enterasys com download download cgi lib c2 and choose the archive link to view information on changes previous to the release inform...

Page 5: ...ed before issuing a reset units not updated will need to be removed from the stack and upgraded individually To upgrade to Release 3 it is highly recommended that you first upgrade to the latest Relea...

Page 6: ...anges and Enhancements in 5 01 06 0006 10690 Corrected an issue where the flowcontrol pause packets were transmitted too early leading to packet loss 10704 Corrected an issue whereby running macauth a...

Page 7: ...mplementation that could result in the loss of SNMP management or high CPU utilization 10396 Corrected an issue whereby after an initial invalid RADIUS request fails subsequent valid requests were rej...

Page 8: ...capability on combo ports Corrected an issue where high rates of multicast traffic caused pause frames to be generated on the upper ports 25 48 of 48 port devices Corrected an issue with the RADIUS re...

Page 9: ...ast traffic See Appendix A of the Release Notes for configuration information Added SMON MIB support for management of Port Mirroring See Appendix A of the Release Notes for configuration information...

Page 10: ...r VLAN egress configuration Resolved an issue with policy where in certain configurations port policy assignments weren t being removed properly Fix an issue with policy based inbound rate limiting wh...

Page 11: ...sending SNTP requests to SNTP servers which have been removed from the device configuration User configured forbidden egress settings will remain persistent in the device configuration and take prece...

Page 12: ...n processing an invalid policy role received from RADIUS The switch now applies the default port role where previously the existing port role was unchanged Corrected a display issue where the operatio...

Page 13: ...ssue that prevented SSH logout when the logout timer expired Corrected a display issue in CLI help for set ssh and set switch commands Corrected a firmware upgrade issue on Fast Ethernet boards that c...

Page 14: ...an SNMP V3 group name created with 2 words encased in quotes would not have the quotes saved in the show config outfile Corrected issue first introduced in release 5 00 69 that could prevent communic...

Page 15: ...tries in the forwarding database as well as disable the physical Ethernet link The set switch description command used to rename member units in the stack is now supported When upgrading the SecureSta...

Page 16: ...role limitation of 100 rules and 10 masks 2 A system limitation of 768 unique rules 3 No DA SA or Ethertype rules 4 Maximum of 15 roles 5 No metering The C3 product should be the master when mixing wi...

Page 17: ...panel ports degrading the rate at which traffic could traverse the CPU When executing a set show or clear VLAN command on a list of VLANs the VLANs can be listed in either ascending or descending orde...

Page 18: ...oup leaves the group its entry will now be correctly aged out of the multicast forwarding database Flow Control Pause packets are now managed appropriately by the SecureStack C2 switch When executing...

Page 19: ...ers now have the ability to remove a specific sid from an MSTI via the CLI An 802 1X authentication PEAP username will allow a maximum of 63 characters If a local routed VLAN interface is configured a...

Page 20: ...suffers from a power system failure the system will now send trap from the etsysPsePowerNotification MIB which can be correctly decoded by NetSight Console Changes and Enhancements in 3 02 32 When a...

Page 21: ...so when the device is upgraded or has a saved configuration loaded onto it the default logging facility will be correctly programmed A problem has been addressed where use of the Automated Security Ma...

Page 22: ...ver If the authentication attempt fails the port will wait until quiet period expires and then remove the MAC address from FDB The device will then take the next MAC address received on the port and r...

Page 23: ...a regular RIP update when redistribution of static routes is enabled Policy profiles configured for VLANs 1 4093 are now supported If one of these profiles is matched the traffic will be marked appro...

Page 24: ...is release so only packets matching the specific criteria specified will be affected by the rule If a user creates a port mirror and then deletes the port mirror this will no longer cause the device t...

Page 25: ...addresses to scroll across the screen The set policy rule 1 port command is not supported and has been removed in this release An issue has been resolved in this release where when executing the comm...

Page 26: ...solved A problem where the Spanning Tree LAG adminpathcost to be ignored after reset has been resolved A problem where the ARP cache would not update when a new ISL port becomes active has been resolv...

Page 27: ...ally but disabled on all ports by default It is recommended that users enable GVRP on inter switch links ISLs and leave it disabled on all other edge ports within the stack Large numbers of ports with...

Page 28: ...f port advertised capability on Combo ports is not persistent When a VLAN tunnel is applied traffic is egressed untagged as expected Show vlanauthorization will display the correct VLAN and MAC addres...

Page 29: ...trigger at each interval even if traffic rates do not exceed the threshold Additionally the RMON Alarm appears to be using the Falling Threshold as the interval instead of using the actual interval o...

Page 30: ...ded when GVRP disabled Packets less than 64 bytes or greater than 1518 will not be counted by IfInErrors MIB When a user has multiauth configured and two authenticated users on a port the etsysMultiAu...

Page 31: ...a time o There are only three Filter Entries available and a user can associate all three Filter Entries with the Channel Entry Configured channel filter and buffer information will be saved across r...

Page 32: ...s Setting an extensive number of policy rules via the CLI can cause momentary loss of CLI and SNMP management The Policy functionality can only assign ports to VLANs which have been statically created...

Page 33: ...t code and then reload the saved configuration onto the device Note that you will not be able to do this remotely unless you have remote console support If a user telnets to another device from the C2...

Page 34: ...m image the device will not prompt the user to save changes or warn the user that changes will be lost Before executing the set switch movemanagment command the user should execute the save config fil...

Page 35: ...age onto all units whose image does not match the manager The stack must then be reset once this command has finished executing for the command to take effect If there is an image mismatch or configur...

Page 36: ...on information for all units in the stack Some units may be omitted from the displayed results For the most up to date information concerning known issues go to the Global Knowledgebase section at htt...

Page 37: ...gementMIB etsysMACLockingMIB etsysSnmpPersistenceMIB etsysMstpMIB etsysMACAuthenticationMIB etsysletfBridgeMibExtMIB etsysMultiAuthMIB etsysSntpClientMIB etsysIeee8023LagMibExtMIB etsysVlanAuthorizati...

Page 38: ...Termination Action RFC 2865 RFC 3580 Tunnel Attributes RFC 2867 RFC 2868 RFC 3580 User Name RFC 2865 RFC 3580 RADIUS Accounting Attributes Attribute RFC Source Acct Session Id RFC 2866 Acct Terminate...

Page 39: ...values for group can range from 0 to 7 Valid values for port type can range from 0 to 1 although only port type 0 is currently supported For example port group 1 would be specified as 1 0 rate Specifi...

Page 40: ...d enable a port mirroring instance 1 Open a MIB browser such as Netsight MIB Tools 2 In the MIB directory tree navigate to the portCopyEntry folder and expand it 3 Select the portCopyStatus MIB 4 Ente...

Page 41: ...ance enter MIB option 1 active and perform an SNMP Set operation 5 Optional Use the CLI to verify the port mirroring instance has been enabled To delete a port mirroring instance 1 Select a previously...

Reviews: