Dell PowerEdge M820 Systems Release Notes - Page 9

Browse online or download pdf Release Notes for Switch Dell PowerEdge M820 Systems. Dell PowerEdge M820 Systems 27 pages. Dell poweredge blade servers getting started guide
Also for Dell PowerEdge M820 Systems: Information Update (38 pages), User Manual (23 pages), Important Information Manual (35 pages), Update Manual (32 pages), Update Manual (28 pages), User Manual (26 pages), User Manual (22 pages), Getting Started Manual (12 pages), Owner's Manual (3 pages), Technical Manual (46 pages), Portfolio Manual (27 pages), Getting Started Manual (14 pages), Getting Started Manual (12 pages), Technical Manual (47 pages)

Dell PowerEdge M820 Systems Release Notes
PowerConnect M6220/M6348/8024/8024F/M8024/M8024-k/
7024/7048/7024P/7048P/7024F/7048R/7048R-RA Release Notes
 Management IP Address Conflict Detection
Management IP address conflict detection actively looks for duplicate IP address assignment and logs conflicts. Only
the last identified IPv4 address conflict is retained for display by a show command. Administrators may examine the
in- memory logs or the output from a SYSLOG server to identify the historical IP address conflicts. If console logging
is enabled for traps, a message will appear on the console indicating that an address conflict has occurred.
 Email Alerting
Email alerting allows administrators to be notified regarding system events. Multiple email addresses can be
configured. The system will attempt to resolve mail servers specified with a DNS FQDN immediately and, if
successful, store the mail-server as an IP address. If a new IP address is subsequently assigned to the mail server, the
operator will need to re-assign the email address on the switch.
Only the Mail User Agent functionality of RFC 4409 is implemented. The PowerConnect switch does not implement
SMTP server functionality.
 802.1x Monitor Mode
Monitor mode is a special debug mode that assists network administrators in configuring new authentication servers.
Users attempting to authenticate using the authentication server are always granted access when monitor mode is
enabled. All interactions with the supplicant and the authentication server are logged.
Administrators are cautioned against enabling monitor mode in a deployed network where 802.1x users may gain
access to sensitive network resources.
 Time Controlled ACLs
Time controlled ACLs allow administrators to apply ACLs based on the time of day. Both periodic and absolute time
periods may be configured.
Administrators are cautioned that invalid (overlapping) periodic entries within a time range will cause the time range to
not be applied. Administrators are advised to test their periodic entries and validate that they become active as expected
before deploying the time ranges in a production network. Administrators can check if a time range is active by using
the show time-range command.
It is recommended to enable ACL logging to ensure notice of ACL activation and de-activation.
 SNTP over IPv6
SNTP operates over IPv4 and IPv6 and may be configured using IPv4 or IPv6 addresses or DNS.
 Strong Passwords
The strong passwords feature allows administrators to specify that switch administrator passwords meet certain
characteristics considered to enhance network security.
Administrators are advised that the minimum character classes configuration must be enabled (value equal to 1 or
greater) along with enabling the strong password feature before the other minimum character class configurations are
enforced. These character class configuration are:
Minimum number of uppercase letters.
Minimum number of lowercase letters.
Minimum number of numeric characters.
Minimum number of special characters
The password strength restrictions do not apply to users configured for the internal authentication server.
System Firmware Version 4.1.0.6
Page 7