Dell PowerConnect M8428-k Release Note

Download Release notes of Dell M8428-K Chassis, Computer Accessories for Free or View it Online on All-Guides.com. This version of Dell M8428-K Manual compatible with such list of devices, as: M8428-K, PowerEdge M915, PowerEdge M520, PowerEdge M620, PowerEdge M820 Systems

Dell M8428-K Release notes - Page 1
1
Dell M8428-K Release notes - Page 2
2
Dell M8428-K Release notes - Page 3
3
Dell M8428-K Release notes - Page 4
4
Dell M8428-K Release notes - Page 5
5
Dell M8428-K Release notes - Page 6
6
Dell M8428-K Release notes - Page 7
7
Dell M8428-K Release notes - Page 8
8
Dell M8428-K Release notes - Page 9
9
Dell M8428-K Release notes - Page 10
10
Dell M8428-K Release notes - Page 11
11
Dell M8428-K Release notes - Page 12
12
Dell M8428-K Release notes - Page 13
13
Dell M8428-K Release notes - Page 14
14
Dell M8428-K Release notes - Page 15
15
Dell M8428-K Release notes - Page 16
16
Dell M8428-K Release notes - Page 17
17
Dell M8428-K Release notes - Page 18
18
Dell M8428-K Release notes - Page 19
19
Dell M8428-K Release notes - Page 20
20
Dell M8428-K Release notes - Page 21
21
Dell M8428-K Release notes - Page 22
22
Dell M8428-K Release notes - Page 23
23
Dell M8428-K Release notes - Page 24
24
Dell M8428-K Release notes - Page 25
25
Dell M8428-K Release notes - Page 26
26
Dell M8428-K Release notes - Page 27
27
PowerConnect M6220/M6348/8024/8024F/M8024/M8024-k/
7024/7048/7024P/7048P/7024F/7048R/7048R-RA Release Notes
System Firmware Version 4.1.0.6 Page 7
Management IP Address Conflict Detection
Management IP address conflict detection actively looks for duplicate IP address assignment and logs conflicts. Only
the last identified IPv4 address conflict is retained for display by a show command. Administrators may examine the
in- memory logs or the output from a SYSLOG server to identify the historical IP address conflicts. If console logging
is enabled for traps, a message will appear on the console indicating that an address conflict has occurred.
Email Alerting
Email alerting allows administrators to be notified regarding system events. Multiple email addresses can be
configured. The system will attempt to resolve mail servers specified with a DNS FQDN immediately and, if
successful, store the mail-server as an IP address. If a new IP address is subsequently assigned to the mail server, the
operator will need to re-assign the email address on the switch.
Only the Mail User Agent functionality of RFC 4409 is implemented. The PowerConnect switch does not implement
SMTP server functionality.
802.1x Monitor Mode
Monitor mode is a special debug mode that assists network administrators in configuring new authentication servers.
Users attempting to authenticate using the authentication server are always granted access when monitor mode is
enabled. All interactions with the supplicant and the authentication server are logged.
Administrators are cautioned against enabling monitor mode in a deployed network where 802.1x users may gain
access to sensitive network resources.
Time Controlled ACLs
Time controlled ACLs allow administrators to apply ACLs based on the time of day. Both periodic and absolute time
periods may be configured.
Administrators are cautioned that invalid (overlapping) periodic entries within a time range will cause the time range to
not be applied. Administrators are advised to test their periodic entries and validate that they become active as expected
before deploying the time ranges in a production network. Administrators can check if a time range is active by using
the show time-range command.
It is recommended to enable ACL logging to ensure notice of ACL activation and de-activation.
SNTP over IPv6
SNTP operates over IPv4 and IPv6 and may be configured using IPv4 or IPv6 addresses or DNS.
Strong Passwords
The strong passwords feature allows administrators to specify that switch administrator passwords meet certain
characteristics considered to enhance network security.
Administrators are advised that the minimum character classes configuration must be enabled (value equal to 1 or
greater) along with enabling the strong password feature before the other minimum character class configurations are
enforced. These character class configuration are:
Minimum number of uppercase letters.
Minimum number of lowercase letters.
Minimum number of numeric characters.
Minimum number of special characters
The password strength restrictions do not apply to users configured for the internal authentication server.