Open Problem Reports and Feature Exceptions

PR 99931

When tagging a link aggregate on an OS6850, QoS does not trust the individual ports of the link aggre- gate.

Workaround: Manually set the trust bit of the underlying ports through QoS (qos port <slot/port> trusted), or set the port default to trusted (qos trust ports).

PR 99983

The OS6850 switch cannot boot up properly with a boot.cfg that exceeds the QoS limitation. It is not recommended to manually edit the boot.cfg to configure your QoS. Booting up with a boot.cfg obtained from a "write memory" is fine.

The hardware allocation checking is not done during boot up causing QoS configurations to be out of sync with the hardware capability.

Workaround: To prevent the boot.cfg from going beyond the QoS limitations on a large QoS configura-

tion, proceed as follows: edit a text file with your desired qos configuration, apply the configuration using "configuration apply text_file", and save the boot.cfg using "write memory".

PR 101223

On an OS6800, if a policy rule specifies the keyword "log" or "log interval", then the policy is rejected.

Workaround: Logging is not supported by the OS6800. The keyword "log" and "log interval" has to be removed from the policy rule definition.

Security

General

Problem Reports

PR 89262

NESSUS reports bogus “Vulnerabilities”. Basically, NESSUS collects all those known attacks/vulnerabili- ties into their test suites.

For example, NESSUS sends: http://<switch-address>/cgi/bin/guestbook.cgi

WebView/HTTP-Server’s response: Prompts user for the default switch login page (which is the normal operation for our embedded server).

Since our HTTP server replies with some form of an HTTP response, NESSUS mistakenly concludes that the HTTP server is vulnerable to this attack.

Workaround: There is no known workaround at this time.

page 74

OmniSwitch 6800/6850/9000—Release 6.1.3.R01

Page 74
Image 74
Alcatel-Lucent 6850, 9000, 6800 user manual Security