v1.3.0rcX BETA bug reports and comments - CLOSED
Posted: Mon May 04, 2015 7:41 pm
Please post comments and report bugs for v1.3.0rcX in this thread
THIS IS BETA FIRMWARE SO IF YOU DO NOT WANT TO LIVE ON THE EDGE USE v1.2.2 FINAL.
PLEASE COMMENT ON THE FIRMWARE GOOD OR BAD FOR OTHER USERS
THIS IS BETA FIRMWARE SO IF YOU DO NOT WANT TO LIVE ON THE EDGE USE v1.2.2 FINAL.
PLEASE COMMENT ON THE FIRMWARE GOOD OR BAD FOR OTHER USERS
v1.3.0rcX BETA wrote:FIXES v1.3.0rc9
-Fixed an issue where v1.3.0rcX would falsely disable POE on a port during reboot.
-Fixed an issue where MIRRORING to an IP address would lock up the switch.\
CHANGES v1.3.0rc8
- Removed DHCP server
- Changes for WS-12-250-AC
- Updated busybox for DHCP fixes
FIXES v1.3.0rc7
- Local authentication is now done before RADIUS authentication
FIXES v1.3.0rc6
- Memory Leak
- Fixed TFTP command in CLI
- Fixed CLI crash when using some commands before switch has fully booted
- Fixed problem with SNMP reporting firmware version
ENHANCEMENTS - v1.3.0rc7
- Added option to exclude syslog messages from NMS
- Added support for 802.1ad aka QinQ aka Provider Bridging
- Added IGMP Snooping
- Added Iperf client and server
- Added DHCP server - WE MAY REMOVE THIS - THOUGHTS PEOPLE?
ENHANCEMENTS - v1.3.0rc6
- Added "Allowed VLANs" to Trunk ports
ENHANCEMENTS - v1.3.0rc5
- Added mirroring to an IP address (TZSP)
- Added "Last IP" to MAC table (ARP learning)
ENHANCEMENTS - v1.3.0rc4
- Added POE Smart (You need to enable this for each port on the Port Tab)
- Added option to require login on console port
- Added RADIUS authentication
KNOWN ISSUES
- Ubiquiti Discovery Protocol is still a little flaky
- Mirror to IP MAC filter is broken
Last IP to mac Outline
This is a cool feature, do not know of any Layer 2 switches that do this?
Mirror to IP Outline
You need to use a program like WireShark then you can mirror a remote switch port or ports to your computer for diagnostics however there is a limit to the amount of PPS this can handle as it is Switch CPU dependent and the 416MHz MIPS 24K is not a power house.
POE Smart Outline
If you enable POE smart on a port the switch will check that port for cross shorts before applying power when you select a POE voltage in the UI/CLI and hit [Save/Apply] or from a cold boot on all ports that have POE Smart enabled.
If you turn POE on a POE Smart port with no cable it will still apply power and you could then conceivably plug in a cable that is shorted so DO NOT DO THIS - PLEASE!
Please only turn POE on a port after the cable is inserted and the device is on the other end and you either have POE Smart ENABLED on that port or you do a cable diagnostic and check for CROSS SHORTS or you will fry ports.
Due to some limitations with the core function it will not protect you from all possible short combinations that you could do by hand twisting specific wires together but it will protect you from punching down or crimping the wrong order in your RJ45 End or Patch Panel which is the most common reason for a dead shorted port.
I have opened a ticket with Vitesse to see if I can get them to change the way the core function works so that it may protect you better from an "oh-crap" mistake that we all make from time to time.
POE Smart will also disable POE on a port if the cable is unplugged when a POE device running on that port because we do NOT want people plugging and unplugging LIVE POE cables. I keep hearing how people did this all the time with ToughSwithes with no problem and all I have to say is there is a huge difference between the amount of watts our switch will deliver (48VH up to 1.5A constant draw under 55C conditions) verses what the ToughSwitch delivered.
We use Poly Fuses to protect against dead shorts and for us to achieve .75A on 2 pair or 1.5A on 4 pair at 55C you have to size your Poly Fuses up to handle that load at 55C so dead shorting a cold Poly Fuse will send an inrush of FAR MORE THAN 1.5A at the Ethernet Transformer that is not meant to handle that amount of current.
However whenever I dead shorted a ToughSwitch in the past by mistake I lost the entire switch, with our switches you lose that ONE port nothing else. We will repair ports you fry for $50 per port.
Radius Authentication Outline
Will use static credentials defined in switch UI or Radius server if configured properly.