Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(46)SE

21
Release Notes for Cisco Catalyst Blade Switch 3120 for HP, Cisco IOS Release 12.2(46)SE
OL-16968-01
Resolved Caveats
CSCso96778
When you use the ipv6 address dhcp interface configuration command on an interface that is
configured in router mode, other addresses on the prefix associated with the new address might not
be accessible.
The workaround is to use the ipv6 address dhcp interface configuration command on an interface
that is configured in host mode, or configure a static route to the prefix through the interface.
Resolved Caveats
These are the caveats that have been resolved in Cisco IOS Release 12.2(46)SE:
CSCin91851, CSCsh42013, and CSCsh42316
The SSH Protocol now supports generic message authentication and is compliant with RFC 4256.
CSCsa73179
A switch no longer fails under these conditions:
OSPF is in the switch image.
You enter the RIP no default-information router configuration command.
CSCse07265
If you configure IP SLA to generate a syslog message for a reaction trap and an operation with a
trigger of timeout or connectionless, a syslog message now appears when triggered.
CSCsg58889
If IEEE 802.1Q tunneling and Layer 2 protocol tunneling are first configured on physical ports, and
the ports are then added to an unconfigured port channel, the port channel no longer stops
forwarding traffic. The port channel now inherits the Layer 2 port configuration.
CSCsg77818
The switch no longer reloads when an interface is configured with both trust boundary and Cisco
Discovery Protocol (CDP) or when the CDP table is repeatedly disabled, enabled, or cleared.
CSCsh70377
When a secondary VLAN is disassociated from the primary VLAN, duplicate MAC addresses on
the primary VLAN no longer remain in the MAC address table.
CSCsi01526
Traceback messages no longer appear if you enter the no switchport interface configuration
command to change a Layer 2 interface from a port channel to a routed port.
CSCsi50367
When changing a switch module port access VLAN from static to dynamic or the reverse, a message
similar to this no longer appears:
01:43:55: PSECURE: Assert failure: is_etherchnl(hwidb_or_null swidb)):
../switch/psecure/psecure_ifc.c: 412: psecure_get_vlanid (l2a1-5) 01:43:55Traceback=
804484 809604 802258 806904 70FC 8D70 5C97BC 6901DC 6903CC 9EF8D8 9E6CC4 (l2a1-5)
CSCsi67680
When unicast routing is disabled and then re-enabled, virtual routing and forwarding (VRF) routing
is no longer disabled on the switch module interfaces.