Specifications

90 ExtremeWare 7.3.1b3 Release Notes
Clarifications, Known Behaviors, and Resolved Issues
The unconfigure igmp Command Does Not Unconfigure All Parameters
The unconfigure igmp command does not set the forward-mcrouter-only or flood-list parameters
to the default values (PD2-141266115).
If PIM-Snooping is Enabled on Current Traffic, All (S,G) Entries Will be Marked as
Invalid
If traffic is present before PIM-Snooping is enabled, or the PIM-Snooping switch reboots as traffic is
present, all (S,G) entries will be marked as invalid. If PIM-Snooping was enabled before the traffic is
received, the entries are marked correctly (PD2-229351706).
Enable or Disable IGMP Snooping on a Sub-VLAN
To disable or enable IGMP snooping on a sub-VLAN, delete the sub-VLAN from the super-VLAN,
change the IGMP snooping status, and add the sub-VLAN to the super-VLAN (PD2-136478101).
Do Not Disable IGMP Snooping with Static Snooping Entries
If you disable IGMP snooping on a VLAN, the configured static IGMP snooping entries do not reply to
the IGMP querier, while real hosts attached to the VLAN will (PD2-158477713).
(S,G) Entry Not Created if RP is Rebooted
An (S,G) entry is not created if the RP is rebooted (1-F4YIP).
Cisco Interoperation
For proper Cisco interoperation, use Cisco IOS version 11.3 or later, which supports PIM 2.0. Cisco
customer support also recommends using PIM in favor of DVMRP whenever possible on Cisco routers
(4669).
Traffic Rate Exceeding Last Hop Threshold
When the traffic rate exceeds the configured last hop threshold, the last hop does not initialize; but if
the sending traffic rate is set to 50 Kbps, it switches to STP correctly (1-57NMY).
Security and Access Policies
Changing VLAN and Wireless Port IP Causes RADIUS Proxy Failure
Authentication failures occur when you change the VLAN and wireless port IP resulting in a RADIUS
proxy failure (PD3-7388921, PD3-6751371).
Cannot Apply a New Port after Creating a Trusted MAC Entry on a VLAN
When creating a trusted-mac-address on a VLAN and omitting the port option, the trusted MAC is
applied to all ports in the entire VLAN. However, the trusted MAC does not apply the newly added
port. You must manually apply trusted MAC to the newly added port
(PD3-3625781).