Cisco 3520 Guia de Instalação Página 15

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 34
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 14
15
Release Notes for the Catalyst 3750 Switch Cisco IOS Release 12.1(14)EA1
OL-4215-01
Limitations and Restrictions
Layer 2 traceroute to identify the physical path that a packet takes from a source device to a
destination device
For a detailed list of key features for this software release, refer to the Catalyst 3750 Switch Software
Configuration Guide.
Limitations and Restrictions
You should review this section before you begin working with the switch. These are known limitations
that will not be fixed, and there is not always a workaround. Some features might not work as
documented, and some features could be affected by recent changes to the switch hardware or software.
These are the limitations and restrictions:
“Cisco IOS Limitations and Restrictions” section on page 15
“Cluster Limitations and Restrictions” section on page 18
“CMS Limitations and Restrictions” section on page 19
Cisco IOS Limitations and Restrictions
These limitations apply to Cisco IOS configuration:
Non-reverse-path forwarded (RPF) IP multicast traffic to a group that is bridged in a VLAN is leaked
onto a trunk port in the VLAN even if the port is not a member of the group in the VLAN, but it is
a member of the group in some other VLAN. Because unnecessary traffic is sent on the trunk port,
it needlessly reduces the bandwidth of the port. There is no workaround for this problem because
non-RPF traffic is continuous in certain topologies. As long as the trunk port is a member on a trunk
port in at least one VLAN, this problem for the non-RPF traffic occurs. (CSCdu25219)
If a bridge group contains a VLAN that has a static MAC address configured, all non-IP traffic in
the bridge group with this MAC address destination is sent to all ports in the bridge group. The
workaround is to remove the VLAN from the bridge group or to remove the static MAC address from
the VLAN. (CSCdw81955)
If the number of multicast routes and Internet Group Management Protocol (IGMP) groups are more
than the maximum number specified with the show sdm prefer global configuration command, the
traffic received on unknown groups is flooded in the received VLAN even though the show ip igmp
snooping multicast-table privileged EXEC command output shows otherwise. The workaround is
to reduce the number of multicast routes and IGMP snooping groups to less than the maximum
supported value. (CSCdy09008)
An egress SPAN copy of routed unicast traffic might show an incorrect destination MAC address on
both local and remote SPAN sessions. This limitation does not apply to bridged packets. The
workaround for local SPAN is to use the replicate option. For a remote SPAN session, there is no
workaround. This is a hardware limitation. (CSCdy72835)
Egress SPAN routed packets (both unicast and multicast) show the incorrect source MAC address.
For remote SPAN packets, the source MAC address should be the MAC address of the egress VLAN,
but instead the packet shows the MAC address of the remote SPAN (RSPAN) VLAN. For local
SPAN packets with native encapsulation on the destination port, the packet shows the MAC address
of VLAN 1. This problem does not appear with local SPAN when the encapsulation replicate option
is used. This limitation does not apply to bridged packets. The workaround is to use the encapsulate
replicate keywords in the monitor session global configuration command. Otherwise, there is no
workaround. This is a hardware limitation. (CSCdy81521)
Vista de página 14
1 2 ... 10 11 12 13 14 15 16 17 18 19 20 ... 33 34

Comentários a estes Manuais

Sem comentários