Open Problem Reports and Feature Exceptions
PR 99931
When tagging a link aggregate on an OS6850, QoS does not trust the individual ports of the link aggre- gate.
Workaround: Manually set the trust bit of the underlying ports through QoS (qos port <slot/port> trusted), or set the port default to trusted (qos trust ports).
PR 99983
The OS6850 switch cannot boot up properly with a boot.cfg that exceeds the QoS limitation. It is not recommended to manually edit the boot.cfg to configure your QoS. Booting up with a boot.cfg obtained from a "write memory" is fine.
The hardware allocation checking is not done during boot up causing QoS configurations to be out of sync with the hardware capability.
Workaround: To prevent the boot.cfg from going beyond the QoS limitations on a large QoS configura-
tion, proceed as follows: edit a text file with your desired qos configuration, apply the configuration using "configuration apply text_file", and save the boot.cfg using "write memory".
PR 101223
On an OS6800, if a policy rule specifies the keyword "log" or "log interval", then the policy is rejected.
Workaround: Logging is not supported by the OS6800. The keyword "log" and "log interval" has to be removed from the policy rule definition.
Security
General
Problem Reports
PR 89262
NESSUS reports bogus “Vulnerabilities”. Basically, NESSUS collects all those known attacks/vulnerabili- ties into their test suites.
For example, NESSUS sends:
Since our HTTP server replies with some form of an HTTP response, NESSUS mistakenly concludes that the HTTP server is vulnerable to this attack.
Workaround: There is no known workaround at this time.
page 74 | OmniSwitch |