Multiple new upgrades and enhancements Part 1
Improvements
Downgrading to a Previous Version
- When attempting to downgrade from Version 3.2.0.84 to version 3.1.1.7 or lower, the device startup the configuration will be deleted as part of the downgrade operation
PoE – Disabling CDP and LLDP Power Negotiation
- In Version 3.2.0.84, a CLI command was added which allows the user to disable CDP and LLDP power negotiation on the port. Command syntax ispower inlinenegotiation{none | all}
PoE – Expired Mode Enhanced Behavior
- As of Version 3.2.0.84 power negotiation will resume also if a new negotiation packet is received after a negotiation has expired
Password History
- Support for the password history feature was added in Version 3.2.0.84. The password history features allow the switch administrator to limit the use of previously used passwords, which enhances the security level of the passwords
Password re-authentication when Changing Password
- As of Version 3.2.0.84 when a logged-in user (Console, Telnet, SSH, or GUI) attempts to modify their own local database-related password, they are required to provide the current password in clear text format
Compare Password Configured by the User to Known Values
- In Version 3.2.0.84 the passwords configured by the user are compared to known values – and the password is rejected if a match to the known value is found
Randomly Generated Password
- Version 3.2.0.84 will allow the user to select a randomly generated password instead of entering one manually
Login Delay and Login Attack Prevention
- Version 3.2.0.84 provides a setting that allows a user to configure a delay following a failed login attempt
Quiet Period Following Failed Attempts
- To address dictionary attacks, Version 3.2.0.84 also allows the user to limit the amount of login attempts allowed within a specific time range by defining a quiet mode period following a specified number of failed attempts
Security Related Logging
- Version 3.2.0.84 enhanced device security by providing additional alerts (syslog and SNMP traps) to changes to device configuration or settings which are related to security