Introduction
January 2026
This Release Note describes the recommended practices and known issues that apply to software version 3.5.3.3 for the Cisco Business 250 and 350 Series Switches.
Caveats Resolved in 3.5.3.3
|
Bug Id |
Description |
|---|---|
|
CSCws68935 |
Symptom: Switch reboots with fatal error from DNSC process. |
Introduction
August 2025
This Release Note describes the recommended practices and known issues that apply to software version 3.5.3.2 for the Cisco Business 250 and 350 Series Switches.
Caveats
|
Bug ID |
Description |
|---|---|
|
CSCwo24702 |
Symptom RPVST or RSTP convergence time is about 30 seconds |
|
CSCwq56715 |
Symptom After Spanning tree state change traffic will not be forwarded by some of the LAG interfaces. |
Introduction
January 2025
This Release Note describes the recommended practices and known issues that apply to software version 3.5.0.26 for the Cisco Business 250 and 350 Series Switches.
Resolved Issues
|
Bug ID |
Description |
|---|---|
|
CSCwn17952 |
Symptom Ignore the EAP response with a unicast destination MAC wrongly. |
Introduction
November 2024
This Release Note describes the recommended practices and known issues that apply to software version 3.5.0.24 for the Cisco Business 250 and 350 Series Switches.
![]() Warning |
Please read the Readme note before installing the firmware upgrade. The firmware upgrade process may take approximately 15 minutes to complete. During this time, the switch may not show any activity. As part of the upgrade process, the switch may reboot a couple of times. Interrupting the upgrade process may result in permanent damage to the switch and make it unusable. |
Version Notes
This section provides the main notes for each version.
General Note - Downgrading to version 3.1.1.7 or Lower Version
When attempting to downgrade from Version 3.2.0.84 (or later) to version 3.1.1.7 or lower, the device startup configuration will be deleted as part of the downgrade operation. User will be alerted to this behavior when attempting to boot from an image earlier than Version 3.2.0.84. It is highly recommended to backup the device configuration file before performing the downgrade and load the saved configuration file to the device after the downgrade was completed.
Version 3.5.0.24
-
This version is a maintenance release on top of CBS version 3.4.0.x.
-
It includes new functionalities as specified below.
What's New in Release 3.5.0.24
This section details new features and modifications in this release compare to previous ones.
Current Release - Version 3.5.0.24
These Release Notes are for CBS Product Line Version 3.5.0.24 release. The CBS Product Line supports the following Product lines: CBS250, CBS250-4X, CBS350, CBS350-4X (stacking) and 10-Gigabit CBS350 modules.
General Note – Downgrading to version 3.1.1.7 or Lower
When attempting to downgrade from Version 3.2.0.84 (or later) to version 3.1.1.7 or lower, the device startup configuration will be deleted as part of the downgrade operation. User will be alerted to this behavior when attempting to boot from an image lower than Version 3.2.0.84. It is highly recommended to backup the device configuration file before performing the downgrade and load the saved configuration file to the device after the downgrade was completed.
Changes to the RADIUS Client Behavior
The main functionality added to this version are changes to the device RADIUS client behavior. These changes were made to address the MD5 vulnerability reported in CVE-2024-3596. This section provides information on this vulnerability and the changes that are made to the device behavior to address the vulnerability.
The attack that is detailed in CVE-2024-3596 exploits the inherent weakness of the MD5 algorithm that is used by the RADIUS protocol (Based on RFC 2865).
The successful execution of this attack may result in a compromise of the RADIUS packet exchange between the switch acting as a RADIUS client, and the RADIUS server. At the extreme exploitation of this vulnerability, the attacker gains the ability to authenticate or authorize any user.
Currently, the attack is not possible if all the messages (RADIUS requests and RADIUS responses) exchanged between the switch and the RADIUS server include the Message-Authenticator attribute (type 80).
![]() Note |
To exploit the attack, the attacker must use a high CPU power computer and physical access to the user network. |
RFC 2869 defines that the Message-Authenticator attribute is mandatory for RADIUS exchanges that contain an EAP-Message attribute (type 79). On the CBS The following applications do not contain an EAP-Message attribute, and are therefore vulnerable to this attack:
-
Management Login access (AAA authentication) – which is always based on RADIUS (and not EAP).
-
8021.x MAC-based authentication (MAB) using the RADIUS authentication method (command dot1x mac-auth RADIUS).
802.1x authentication and MAC-based authentication (MAB) using the EAP method (command dot1x mac-auth EAP – which is the default configuration), are not vulnerable to this attack. The RADIUS requests that in these applications contain the EAP-Message attribute, and the device also verifies that the RADIUS responses include this attribute and that it is valid.
Changes to the Device Behavior
To prevent the exploitation of vulnerabilities the following changes were implemented in the CBS 3.5.0.x release. Their purpose is to ensure that the Message-Authenticator attribute is included in all RADIUS packets:
-
The Message-Authenticator attribute is included in all RADIUS request packets – including AAA authentication and 802.1x MAC-based authentication (MAB) using the RADIUS authentication method.
-
The Message-Authenticator attribute is included as the 1st attribute in the RADIUS request packet. This is also implemented for 802.1x authentication and MAC-based authentication (MAB) using the EAP method.
-
A new setting was added to this release - The user can define that the Message-Authenticator is mandatory for all RADIUS responses and not only for RADIUS responses that contain the EAP-Message attribute. RADIUS responses that do not include this attribute (or that the authenticator is not valid) will be dropped. By default the Message-Authenticator is mandatory only for RADIUS responses that contain the EAP-Message attribute.

Note
The reason this setting is optional and disabled by default, is to allow compatibility with existing RADIUS server behavior.
According to RFC 2869 the Message-Authenticator is not mandatory in RADIUS responses that do not contain the EAP-Message attribute. Therefore, unless the RADIUS request contains the EAP-Message attribute, many RADIUS servers will not include a Message-Authenticator attribute in the response even if the RADIUS request included the Message-Authenticator.
In the future, when RADIUS server behavior will be modified to include the Message-Authenticator attribute in all responses (to address this vulnerability), this behavior may be enabled by default or even mandatory.
New CLI Commands
-
The following CLI command was added to the device to enable/disable mandatory Message-Authenticator attribute in all RADIUS responses: “radius-server force-message-authenticator host {ip-address | hostname}”.
The default is disabled.
-
The “show radius-servers” command was updated to display whether the setting is enabled or disabled.
For mode details on the usage of the commands, see the CBS 3.5 CLI guide.
This setting is not supported in the device GUI management interface.
Changes in This Version Related to CBD
The following changes were added to this version:
-
CBD network Probe version that is upgraded to version 2.9.0.20240823.
-
Added CBD probe mode information to CLI Operational status field (“show cbd” command) and Probe Status GUI field. The probe mode is relevant only when the probe is active. The following probe modes are displayed.
-
Probe Managed- The Probe performs network discovery and communicates directly with each managed device on behalf of the Dashboard.
-
Direct Managed- Direct managed devices will discover other devices in the broader network and connect those devices to the Dashboard automatically than those devices become manageable.
-
Changes to the Password Complexity Settings
The following changes were made to existing passwords complexity settings:
Dictionary Words and Common PasswordsIn the previous versions, when comparing the new passwords to the list of dictionary words and common passwords, the configured password would be rejected also in the following cases:
-
The word in the list appears in any part of the password (beginning, middle, or end).
-
The word in the list appears in reverse order in the password.
-
The word in the list appears in the password in any case (lower or uppercase) combination.
-
When comparing, the following letters are interchangeable: "$" for "s", "@" for "a", "0" for "o", "1" for "l", "!" for "i", "3" for "e", is not permitted. For example, Pa$$w0rd is not permitted.
As of CBS version 3.5, the rules for comparison were narrowed as follows:
-
The new password does not match and does not begin with a word included in the list (removed the “contained” requirement).
-
The word in the list appears in the password in any case (lower or uppercase) combination.
All the other requirements were dropped.
In the previous versions, when rejecting a password that contains more than 2 sequential characters, the configured password would be rejected also in the following cases:
-
Letters are case insensitive.
-
Reverse sequence.
-
Sequence that is created by replacing the following letters with symbols: "$" for "s", "@" for "a", "0" for "o", "1" for "l", "!" for "i", "3" for "e".
As CBS version 3.5, only the case insensitive requirement remains. The other requirements were dropped.
Resolved Issues
|
Bug ID |
Description |
|---|---|
|
CSCwh06602 |
Symptom 802.1x (MAC based VLAN - MAB) does not work if stp mode is PVST or RSTP. |
|
CSCwj41508 |
Symptom UPOE negotiation issue with Ruckus |
|
CSCwj84938 |
Symptom CBD reconnect issue (DNS resolution issue). |
|
CSCwn24312 |
Symptom When inserting a 100M supported Gbic MFEFX1 and GLC-FE-100FX, there is syslog of "unsupported SFP type inserted". |
|
CSCwk85477 |
Symptom Sometimes switch cannot connect to CBD after reboot. |
|
CSCwe92236 |
Symptom CBS350 ACL binding that contains multiple ACE with port ranges may gets rejected. |
|
CSCwj13150 |
Symptom CBS350: Port with security enabled in Limited Dynamic Lock mode may not decrement the address count. |
|
CSCwi98345 |
Symptom CBS350: Private VLAN host ports may not learn MAC addresses when running PVST. |
|
CSCwj59319 |
Symptom DHCP server does not respond to Discover and will not send an offer. |
|
CSCwn24283 |
Symptom Green Ethernet power saving display issue on the WEB GUI |
|
CSCwn24295 |
Symptom Got unexpected error message "CBD Retrieve Certificate failed" on GUI. |
Known Issues
|
Bug ID |
Description |
|---|---|
|
CSCwn24224 |
Symptom Removed default SNTP Servers come back after upload a configure file without default SNTP server. WorkaroundUser can manually remove the servers. |
|
CSCwn24106 |
Symptom Can’t do traceroute in GUI for a URL (it works for ip address) WorkaroundUse CLI to traceroute urls. |
|
CSCwn24256 |
The switch cannot connect to the CBD Dashboard with a static DNS entry if CBD hostname cannot be resolved by DNS server. WorkaroundNone |
Introduction
December 2023
This Release Note describes the recommended practices and known issues that apply to software version 3.4.0.17 for the Cisco Business 250 and 350 Series Switches.
![]() Warning |
Please read the Readme note before installing the firmware upgrade. The firmware upgrade process may take approximately 15 minutes to complete. During this time, the switch may not show any activity. As part of the upgrade process, the switch may reboot a couple of times. Interrupting the upgrade process may result in permanent damage to the switch and make it unusable. |
![]() Note |
Some of the CBS features require the platform to support the ACT2 chip (See the following General Note). The Appendix section will also provide information on the platforms that support the ACT2 chip. |
Version Notes
This section provides the main notes for each version.
General Note - Downgrading to version 3.1.1.7 or Lower Version
When attempting to downgrade from Version 3.2.0.84 (or later) to version 3.1.1.7 or lower, the device startup configuration will be deleted as part of the downgrade operation. User will be alerted to this behavior when attempting to boot from an image earlier than Version 3.2.0.84. It is highly recommended to backup the device configuration file before performing the downgrade and load the saved configuration file to the device after the downgrade was completed.
Version 3.4.0.17
-
This version is a maintenance release on top of CBS version 3.3.0.x.
-
It includes new functionalities (As specified in section 3.1 below) and bug fixes (As specified in section 4.1 below).
What's New in Release 3.4
This section details new features and modifications in this release compare to previous ones.
Current Release - Version 3.4.0.17
Cisco Business Switches Product Line Version 3.4.0.17 on top of the features supported in version 3.3.0.x.
GUI – Added links to Virtual Assistance and Cisco Business Dashboard (CBD) Product Web Page
Added in GUI to the Virtual Assistance and to the CBD Product Web page:
-
As icons on the Mast page.
-
As Other Resources hyperlinks on the Getting Started page.
CBD Probe Version
The CBD probe version was updated to 2.6.1.20231011 (from version 2.6.0.20230314 in release 3.3.
OpenSSL Version Upgrade
OpenSSL version was upgraded to version OpenSSL 1.1.1w (from version OpenSSL 1.1.1q in release 3.3).
Updates TLS Ciphers List
The following CBC based ciphers are no longer supported in release 3.4
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA
-
TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384
-
TLS_RSA_WITH_AES_256_CBC_SHA256
-
TLS_RSA_WITH_AES_256_CBC_SHA
-
TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256
-
TLS_RSA_WITH_AES_128_CBC_SHA
Therefore the list of supported ciphers in release 3.4 is:
TLS 1.2 ciphers:
-
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 (secp256r1)
-
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (secp256r1)
-
TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 (secp256r1)
-
TLS_RSA_WITH_AES_256_GCM_SHA384 (rsa 3072)
-
TLS_AES_256_GCM_SHA384
-
TLS_CHACHA20_POLY1305_SHA256
-
TLS_AES_128_GCM_SHA256
TLS 1.3 ciphers:
-
TLS_AES_128_GCM_SHA256
-
TLS_CHACHA20_POLY1305_SHA256
-
TLS_AES_256_GCM_SHA384
Resolved Issues
|
Bug ID |
Description |
||
|---|---|---|---|
|
CSCwc24759 |
Symptom The Global PoE Power consumption does not match the per port calculation is displayed in CLI and GUI. |
||
|
CSCwe92236 |
Symptom
In some cases binding to port fails for an ACL that containing multiple rules with TCP/UDP port range. |
||
|
CSCwf13332 |
Symptom Can't use a period (.) in the GUI when configuring DHCP Server Option 66 text field. |
||
|
CSCwe25855 |
Symptom Link flapping may occur when inserting the GLC-TE v03 S/N prefix ACWxxxxx. |
||
|
CSCvx44260 |
Symptom Connection to PNP server fails if PNP server address is configured as IPv6 Link Local address. |
||
|
CSCwd42686 |
Symptom If an interface is not a member of the native trunk VLAN, it will generate a "native VLAN mismatch" syslog even though the link partner has the same configuration. |
||
|
CSCwa31487 |
Symptom Traffic is blocked on an interface if the IP source guards is enabled on the port and in addition an IPv6 ACL is applied to the same interface. |
||
|
CSCwd05831 |
Symptom Traffic on standby unit is blocked in case BPDU guard is enabled on multiple interfaces and a stack topology change occurs. |
||
|
CSCwd59630 |
Symptom The passwords in RADIUS server users are displayed in cleartext in the show running command. |
||
|
CSCwe07075 |
Symptom When 802.1x is used for a VLAN assignment (DVA) and a guest VLAN is enabled, after a while some ports may incorrectly assign a client to the guest VLAN even though they've successfully authenticated. |
||
|
CSCwd67981 |
Symptom Following active unit failure, the uplink ports on the standby unit, move to the down state and don’t pass traffic. |
||
|
CSCwf48882 |
Symptom In some cases an ACE configured on a VLAN will be applied to an interface on the active unit only after the active unit is reloaded. |
||
|
CSCwf66976 |
Symptom UDP port 5353 stays open even though Bonjour is disabled. |
||
|
CSCwh59622 |
Symptom Device does not present login prompt following reload in case certain DNS client configurations are present in the startup config file. |
||
|
CSCwi35929 |
Symptom The SSH Connection to the DUT fails with a Key exchange algorithm of RSA-SHA2-512 and RSA-SHA2-256. |
||
|
CSCwi54917 |
Symptom Green Ethernet energy detection - it is not possible to enable on 10G ports via the GUI. |
||
|
CSCwi54919 |
Symptom SSH-client terminal session stuck with Bitvise SSH-Server. |
||
|
CSCwi54921 |
Symptom No PNP CA bundle present after a factory default reset. |
||
|
CSCwf35979 |
Symptom Common vulnerability and exposures (CVE): CVE-2011-1473 and CVE-2011-5094.
|
||
|
CSCwe76605 |
Symptom The plaintext input box of the Access Key Secret is grayed out on the CBD setting page. |
||
|
CSCwe76469 |
Symptom Changing the HTTPs port utilized by the CBD probe has no effect. |
||
|
CSCwh12919 |
CBS350-48P-4X - fatal error when rediscovering switch using Auvik tool Reporting Task: STSD |
Known Issues
|
Bug ID |
Description |
|---|---|
|
CSCwh06602 |
Symptom CBS350 - dot1x mac address table issue when STP is disabled but STP mode is PVST or RPVST WorkaroundNone. |
|
CSCwk85477 |
Symptom In a rare scenario, the switch cannot connect to CBD after a reboot. WorkaroundApply the default route or reboot again. |
Introduction
May 2023
This Release Note describes the recommended practices and known issues that apply to software version 3.3.0.16 for the Cisco Business 250 and 350 Series Switches.
![]() Warning |
Please read the Readme note before installing the firmware upgrade. If upgrading from any firmware below 3.2.0.84 to 3.2.0.84 or greater, note that the firmware upgrade process may take approximately 15 minutes to complete. During this time, the switch may not show any activity. As part of the upgrade process, switch may reboot couple of times. Interrupting the upgrade process may result in permanent damage to the switch and make it unusable. |
![]() Note |
Some of the CBS features require the platform to support the ACT2 chip (See section below). The Appendix will also provide information on the platforms that support the ACT2 chip. |
Downgrade Restrictions Disclosure
Downgrading is the process of installing a lower firmware version to a device from a higher firmware version. Except as indicated in Device Lists in the Appendix, downgrading a firmware is available to all CBS products from any higher firmware down to a lower version.
Please keep in mind that we recommend that customers should run the most recent firmware unless there is a compelling reason to do otherwise. Even so, we recommend using it only temporarily while working on a problem.
Our latest release as of April 2023 is 3.3.0.16
These restrictions and notes may be amended if circumstances warrant.
General Note – Downgrading to version 3.1.1.7 or Lower Version
When attempting to downgrade from Version 3.2.0.84 (or later) to version 3.1.1.7 or lower, the device startup configuration will be deleted as part of the downgrade operation. User will be alerted to this behavior when attempting to boot from an image lower than Version 3.2.0.84. It is highly recommended to backup device configuration file before performing the downgrade and load the saved configuration file to device after downgrade was completed.
Hardware Dependent Features
This section will detail features introduced in release 3.2.0.84, and that require the device to include the ACT2 chip. The ACT2 is supported only in the platforms listed in the table in the Appendix and according to the Hardware VID indicated in the notes to the table.
What's New in Release 3.3.0.16
This section details new features and modifications in this release compare to previous ones.
CBD Probe Version
Cisco Business Dashboard (CBD) Probe version was upgraded in this release to version 2.6.0.20230314 (upgraded from version 2.4.1.20220225 supported in CBS release 3.2.x.x. This CBD version includes bug fixes and the new functionalities detailed in the next items:
CBD - Organization and Network Name Parameters
Up until CBS release 3.2.x.x (inclusive) the user was required to define the following 2 parameters in order to allow the connection to the Dashboard:
-
CBD Organization Name
-
CBD Network Name
The above two parameters are no longer required as of CBS version 3.3.x.x and are thus removed from the device CLI and the graphical user interface (GUI).
If the user upgrades from a CBS version 3.2.x.x (or earlier) to version 3.3.x.x (or higher) the above 2 parameters will be removed from the configuration file.
![]() Note |
This section is relevant both to manual “traditional” connection to Dashboard and connection using the CBD Wizard (See following section). |
CBD Wizard
Up until CBS release 3.2.x.x (inclusive) prior to connecting the device to the Dashboard, the user was required to do the following:
-
Pre-register the device with the CBD services (including device PID and SN).
-
Install a root CA certificate on the switch.
-
Configure on the device an Access Key ID and secret.
In CBS release 3.3, the user has an option to manually perform the above, or to use a CBD Wizard to simplify the connection and registration to the CBD server. The CBD Wizard is supported only via GUI.
Connection steps, using the wizard are as follows:
-
Navigate to the following page: Administration > Cisco Business Dashboard Settings.
-
Enable the Dashboard Connection and configure the address (IP/host) and port of the Dashboard.
-
Select Online with Web Browser to use the Wizard to configure the connection to the Dashboard.
-
Once process is completed and approve by the user, the Dashboard updates the switch with the relevant CA root certificate and CBD access key.
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCwd60295 |
Symptom
Incorrect STP output may be visible if STP is disabled and mode is set to PVST or RPVST. |
|
CSCwe64339 |
Symptom
Management ACL generates errors for inbuilt Probe. |
|
CSCwe64160 |
Symptom
FATAL error when enable MSTP and show spanning-tree detail on a stack. |
|
CSCwd59624 |
Symptom The command "display macro auto ports" needs the line "SmartPort is enabled" removed. |
|
CSCwe32312 |
Symptom Cisco Small Business Series Switches Buffer Overflow Vulnerabilities |
|
CSCwe32313 |
Symptom Cisco Small Business Series Switches Unauthenticated Heap Buffer Overflow |
|
CSCwe32315 |
Symptom Cisco Small Business Series Switches Buffer Overflow Vulnerabilities |
|
CSCwe32318 |
Symptom Cisco Small Business Series Switches Unauthenticated Denial-of-Service |
|
CSCwe32321 |
Symptom Cisco Small Business Series Switches Buffer Overflow Vulnerabilities |
|
CSCwe32323 |
Symptom Cisco Small Business Series Switches Stack Buffer Overflow |
|
CSCwe32326 |
Symptom Cisco Small Business Series Switches Unauthenticated BSS Buffer Overflow |
|
CSCwe32334 |
Symptom Cisco Small Business Series Switches Unauthenticated Stack Buffer Overflow |
|
CSCwe32338 |
Symptom Cisco Small Business Series Switches Unauthenticated Configuration Reading |
Known Issues
|
Bug ID |
Description |
|---|---|
|
CSCwe76469 |
Symptom The CBD probe does not respond when the HTTPs port is changed. WorkaroundAfter changing the HTTPs port, disable and then re-enable the CBD probe, or reset the CBD probe using the CLI command "cbd reset" or the WEB GUI button "Reset Connection." |
|
CSCwe76605 |
Symptom
On the CBD settings page, the plaintext input box for the Access Key Secret is grayed out. WorkaroundClick the plaintext box, then move to encrypted, then back to plaintext. |
|
CSCwe87662 |
Symptom Fails to launch the CBD connect wizard on a standalone device with unit ID 2 WorkaroundConfigure as unit 1. |
|
CSCwe87686 |
Symptom Sometimes the command “clear ipv6 neighbor binding table” may cause unexpected log messages on the console. WorkaroundNone |
Firmware 3.2.xx Release
March 2023
This Release Note describes the recommended practices and known issues that apply to software version 3.2.x.x for the Cisco Business 250 and 350 Series Switches.
![]() Warning |
Please read the Readme note before installing the firmware upgrade. Note that the firmware upgrade process may take approximately 15 minutes to complete. During this time, the switch may not show any activity. As part of the upgrade process, switch may reboot couple of times. Interrupting the upgrade process may result in permanent damage to the switch and make it unusable. |
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCwe52939 |
Symptom
Sometimes a specific SFP(GLC-SX-MM-RGD can cause I2C bus read issue, therefore it can damage the device during boot up. This issue impacts the 24 ports Gigabits CBS250/350 switches with HW version 03 or 05. |
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCwd29685 |
Symptom
Display specific startup configure file causes fatal error - %SYSLOG-F-OSFATAL: caught segmentation fault exception at address 0xfffe947e9000 |
|
CSCwc68648 |
Symptom
ARP issue in Rapid PVST mode. |
|
CSCwc31999 |
Symptom
CBS350-48P-4X-EU - SSH session will not time out |
|
CSCwc32010 |
Symptom
Failed to manage device via console, SSH and GUI after a while. |
|
CSCwa69564 |
Symptom
On the CBS350, the access control list entries (ACEs) created in GUI cannot be removed via CLI. |
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCvx89372 |
Symptom
Help text was “"Destination/Source MAC Wildcard Mask" which did not provide info on the field format. The help text was changed to “See Online Help for format”. |
|
CSCwc39418 |
Symptom
Alert Icon continues to blink even though it was disabled by user. |
|
CSCvw65642 |
Symptom
In some cases when setting a session timeout via GUI it is not saved to startup configuration and is not applied after reboot. |
|
CSCwa91538 |
Symptom
In some cases when removing and then re-applying ACL to VLAN interface, operation may fail with message related to hardware resources, and backup unit may reboot. |
|
CSCvz42028 |
Symptom
In some cases, in PVST mode the output from command "show spanning-tree active vlan <#>" may show access ports that do not belong to the specified VLAN. |
|
CSCwc39424 |
Symptom
After about 2 hours SNTP stops polling SNTP servers which were configured by hostname. |
|
CSCwc39428 |
Symptom
Wrong LDP MAC-PHY TLV value for 2.5 and 10G interfaces. |
|
CSCwc39431 |
Symptom
Following a stack switchover to a Standby unit, the Probe does not automatically reconnect to CBD Dashboard. |
|
CSCvu81808 |
Symptom
In some cases, an ACE will be deleted if edited via GUI. |
|
CSCwc39432 |
Symptom
Auto negotiation of MAC/PHY configuration/Status TLV indicates disable although interface is set to auto- negotiation |
|
CSCwc39434 |
Symptom
After importing a CA certificate with "tab" characters through the GUI, the "signer" CA will be displayed twice. |
|
CSCwc39437 |
Symptom
PoE settings and statistics page display on the GUI is very slow. |
|
CSCwc39514 |
Symptom
When switching a DHCPv6 client from a VLAN interface to a physical interface, the device may crash in some cases. |
|
CSCwc39515 |
Symptom
Command renew dhcp oob fails if previously the OOB interface declined an address due to conflict with default IP on VLAN 1. |
|
CSCwc39531 |
Symptom
Login via CBD mobile app fails if device credentials are added/changed via GUI. |
|
CSCwb57285 |
Symptom
A Class0-4 PoE PD with low priority and no LLDP negotiated may reboot when a Class4 PD is plugged in. |
|
CSCvz97713 |
Symptom
CBS250-8P-E-2G - The link flaps and "denied counter" increments in PoE . |
Known Issues
| Bug ID |
Description |
|---|---|
|
CSCwc39517 |
Symptom After a brief power outage, the switch may occasionally fail to respond. CBS350-24XTS is the only SKU with this symptom. WorkaroundNone |
| CSCwc39527 | Symptom On some platforms legacy PoE PDs are detected as 802.3AT instead of 802.3AF. WorkaroundNone |
|
CSCwc39529 |
Symptom Sometimes I2C related messages are generated when inserting SFP GLC-BX, GLC-BX-D or MGBLX1-V2-1G transceivers. WorkaroundThere are no functionality issue, SFP will be initialized in few seconds. |
| CSCwc44155 | Symptom Backup Dashboard data to USB before enabling CBD, as "File operations" on the web page become invalid. WorkaroundThe functionality of the WEB page "File operations" cannot be restored, however the relevant CLI capabilities continue to function. |
|
CSCwc39519 |
Symptom Login Attack prevention- the failed login attempt count, time period and quite mode are reset when an active unit switchover occurs. WorkaroundNone. |
|
CSCwc39521 |
Symptom When setting VLAN1 to static IP address 192.168.1.254 and quickly pinging other device the ping fails WorkaroundManually configure IP address instead of copying paste the IP configure commands. |
|
CSCwc39522 |
Unable to access device GUI management if device software is downgraded from 3.2.0.x to 3.1.1.7 or lower version – unless user removes browser cookies. WorkaroundRemove browser cookies before connecting to a device. |
|
CSCwc39527 |
Symptom On some platforms legacy PoE PDs are detected as 802.3AT instead of 802.3AF WorkaroundNone. |
|
CSCwc39529 |
Symptom I2C related messages are generated when inserting SFP GLC-BX, GLC-BX-D or MGBLX1-V2-1G transceivers. WorkaroundThere are no functionality issue, However it is suggested to check the transceiver status using the show inventory and show interface status commands. |
|
CSCwc39530 |
Symptom Certificate revocation configuration is missing from configuration file after upgrading from an earlier version to version 3.1.1.7 WorkaroundNone |
Firmware 3.1.1.7 Release
September 2021
This Release Note describes the recommended practices and known issues that apply to software version 3.1.1.7 for the Cisco Business 250 and 350 Series Switches.
What is New in Release 3.1.1.7
This section details new features and modifications in this release compare to previous one.
1.1 Default IP Settings on Devices that Support OOB
On previous versions, the default management interface, on devices that support OOB in native mode, was applied to the OOB port and not on the default VLAN. In Hybrid mode default IP management interface is applied to VLAN 1 and OOB is disabled. From this version and on, the default management interface is applied to VLAN 1, even on devices in native mode that support OOB. The OOB interface, in new behavior, will be DCHP enabled by default in native mode, and will not support the default IP settings. In Hybrid mode OOB will be disabled, as in previous version.
The following table summarizes VLAN 1 and OOB default IP setting before and after the change applied in version 3.1.1.7
|
Cisco Business firmware up to version 3.1 |
Cisco Business firmware version 3.1.1.7 |
|||
|---|---|---|---|---|
|
OOB interface |
VLAN 1 interface |
OOB interface |
VLAN 1 interface | |
|
IP settinngs |
Default IP + DHCP |
DHCP enable |
Default IP + DHCP |
|
|
Interface CLI configuration |
None |
None |
"IP address dhcp" |
None |
|
Other |
Bonjour enabled |
None |
None |
Bonjour enabled |
![]() Note |
When upgrading or downgrading between previous and current version the intention is to keep existing configuration unless device is set to factory default. Please note configuration before and after upgrade/downgrade operation and verify configuration. |
![]() Note |
Refrain from changing stacking mode when upgrading to new version. The new settings may be different then expected. If a change of mode is needed, first change the mode and then upgrade the stack. |
1.2 Updated Cisco Trusted Core Bundle
The 3.1.1.7 firmware uses the Cisco core bundle.
1.3 New PoE Driver
New PoE driver version 0.2.0.17.
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCvy74466 |
Symptom Cannot access device privilege exec mode using enable password. |
|
CSCvw29853 |
Symptom Device may reboot if connected Polycom phones send LLDP info. |
|
CSCvw28120 |
Symptom Device may reboot if connected NEC DT800 phones send LLDP info. |
|
CSCvy66085 |
Symptom Ongoing syslog messages related to FDB hash collision flood interfere with console usage. |
|
CSCvz45993 |
Symptom Device GUI cannot load if any interface description includes the word “form”. |
|
CSCvz46007 |
Symptom Device will reboot if clicking on OLH general information sub items. |
|
CSCvz59935 |
Symptom Fiber link between SG350X-48MP and CBS350-48XT-4 flaps and then suspended |
|
CSCvw84846 |
Symptom After awhile, the PoE will stop the power supply on some interfaces. |
|
CSCvw86418 |
Symptom CBD Probe cannot connect if the name of the CA certificate configured on devices includes a space in the certificate name (for example “my cert”). |
|
CSCvz46020 |
Symptom Device reloads after setting IPv6 tunnel as route destination. |
Known Issues
| Bug ID |
Description |
|---|---|
|
CSCvz58788 |
Symptom Certificate revocation configuration is missing from configuration file after upgrading from an earlier version to version 3.1.1.7. WorkaroundNone. |
|
CSCvz62516 |
CBD probe and mobile app fail to connect device with updated password after modify user password via device web gui. If modify user password via CLI or CBD probe, there is no problem. WorkaroundLog out the device web gui then log in with new password. |
|
CSCvz64701 |
CBS350-48P-4G: Port may power cycle when both wireless access point and phone are connected. WorkaroundNone. |
|
CSCvz67634 |
CBS350-24P-4X: PoE not resetting properly and leading to PD devices losing power and flap) WorkaroundNone. |
Release Notes for Cisco Business 250 and 350 Series Switches - Software Version 3.1.0.57
February 2021
This Release Note describes the recommended practices and known issues that apply to software version 3.1.0.57 for the Cisco Business 250 and 350 Series Switches.
Whats New in Release 3.1.0.57
1.1 Enhancements
The following list introduces the changes and enhancements featured in this release.
-
RIPv2 support on CBS350 SKUs
-
CA certificates are valid only if system clock was set by user, RTC or SNTP.
-
Hybrid stack support was added to CBS350 stacking SKUs
-
Naming of stacking unit roles was changed to Active Unit, Standby Unit and Member Unit
-
CBD Probe version 2.2.1.x
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCvs26294 |
Symptom Port security supporting shutdown action for MACs that are secured on other interfaces. |
|
CSCvx48537 |
Symptom SNMPv3 security improved by deprecating md5 authentication method and DES encryption method and replacing them with SHA-2 authentication and AES-128 as encryption method. |
|
CSCvx48588 |
Symptom Changed default settings of voice VLAN and autosmart port to disable. |
|
CSCvx48591 |
Symptom Added Built-in Bundle support for PNP agent. |
|
CSCvx48594 |
Symptom Added PNP server Certificate CN/SAN validation to enhance security. |
|
CSCuu65557 |
Symptom If the management session is using the device’s IPv6 address, and this is asecure session (HTTPS), the device cannot be managed using the Safari browser. |
|
CSCvu81809 |
Symptom Apply/Remove acl to/from port-channel and its member port cause traffic interrupt. |
|
CSCvu81810 |
Symptom Fail to associate time-range with mac acl via GUI. |
|
CSCvu81807 |
Symptom After set permit ip source 10.10.10.1 service telnet gi1, Show management access-list Telnet_Only then it will not display port. |
Known Issues
|
Number |
Description |
|---|---|
|
CSCvx44260 |
Symptom Connection to PNP server fails if PNP server address is configured as IPv6 Link Local address. WorkaroundUse Global IPv6 address or IPv4 address. |
|
CSCvx44267 |
Symptom 100Mbps Half duplex cannot be configured on OOB port. WorkaroundUse different speed settings to connect to OOB. |
| CSCvx44269 | Symptom On some Mgig interfaces when no cable is connected, or cable length is very short (shorter than 3 meters), running Cable test (VCT) may provide unpredictable results. WorkaroundNone. |
|
CSCvx44271 |
Symptom Alert Icon continues to blink even though alert Icon Blinking was disabled by user. WorkaroundNone. |
|
CSCvx44276 |
Symptom On XG uplink interfaces of certain devices Egress traffic shaping(CIR) with a value less than 18M, may shape traffic to less than set value. WorkaroundNone. |
Release Notes for Cisco Business 250 and 350 Series Switches - Software Version 3.0.0.69
September 2020
This Release Note describes the recommended practices and known issues that apply to software version 3.0.0.69 for the Cisco Business 250 and 350 Series Switches that include the following models:
|
Model |
Product Label |
|---|---|
|
CBS250-8T-E-2G |
8-Port Gigabit Smart Switch |
|
CBS250-8PP-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-8P-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-8FP-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-16T-2G |
16-Port Gigabit Smart Switch |
|
CBS250-16P-2G |
16-Port Gigabit PoE Smart Switch |
|
CBS250-24T-4G |
24-Port Gigabit Smart Switch |
|
CBS250-24PP-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-24P-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-24FP-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-48T-4G |
48-Port Gigabit Smart Switch |
|
CBS250-48PP-4G |
48-Port Gigabit PoE Smart Switch |
|
CBS250-48P-4G |
48-Port Gigabit PoE Smart Switch |
|
CBS250-24T-4X |
24-Port Gigabit Smart Switch with 10G Uplinks |
|
CBS250-24P-4X |
24-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS250-24FP-4X |
24-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS250-48T-4X |
48-Port Gigabit Smart Switch with 10G Uplinks |
|
CBS250-48P-4X |
48-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS350-8T-E-2G |
8-Port Gigabit Managed Switch |
|
CBS350-8P-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8P-E-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8FP-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8FP-E-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-16T-2G |
16-Port Gigabit Managed Switch |
|
CBS350-16T-E-2G |
16-Port Gigabit Managed Switch |
|
CBS350-16P-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-16P-E-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-16FP-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-24T-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-24P-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-24FP-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-48T-4G |
48-Port Gigabit Managed Switch |
|
CBS350-48P-4G |
48-Port Gigabit PoE Managed Switch |
|
CBS350-48FP-4G |
48-Port Gigabit PoE Managed Switch |
|
CBS350-24T-4X |
24-Port Gigabit Stackable Managed Switch with 10G Uplinks |
|
CBS350-24P-4X |
24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-24FP-4X |
24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-48T-4X |
48-Port Gigabit Stackable Managed Switch with 10G Uplinks |
|
CBS350-48P-4X |
48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-48FP-4X |
48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
What's New in This Release
1.1 Browser and OS Support
The device web UI supports the following browsers and OS system:
-
Supported OS – MS Windows 7 (32 & 64 bit), MS Windows 10 (32 & 64 bit), MAC OS (not supported: MS Windows 8, 8.1, XP and Vista; Linux)
-
Supported Browsers – Chrome, Firefox and Microsoft Edge (Microsoft Internet Explorer not supported) – both for Windows and for MAC OS; Safari – MAC OS only .
1.2 Web GUI Style
The CBS 3.0 uses a new GUI style which is the PISA compliant.
1.3 Password Complexity
For enhanced security, the user does not have the option to disable the password complexity setting. The password complexity is supported with the following default and ranges:
-
Min-length – range 8-64, default = 8
-
Min-class – range 1-4, default = 3
-
No-repeat – range 1-16, default = 3
-
Not-current/not-username/not manufacturer = are always enabled
1.4 SSL Cipher Support
For enhanced security, support for the following Ciphers was removed:
-
RSA_WITH_AES_128_CBC_SHA256;
-
RSA_WITH_AES_128_GCM_SHA256;
-
RSA_WITH_AES_128_CCM_8;
-
RSA_WITH_AES_256_CCM_8
1.5 SSL Cipher Support
OpenSSL version upgraded from 1.1.0b to 1.1.0l (Lower case L).
1.6 Console Support
Both RJ45 and mini-USB console are supported on CBS350 and CBS250 switch models listed in this release note. The mini-USB has precedence.
1.7 Password Encryption
In the previous version, the user’s credentials were saved to the config file and displayed using SHA-1 hash algorithm. In the current release, the user’s credentials are salted and hashed using PBKDF2 based on HMAC-SHA-512 hash. This adds additional security to the credentials and protects them from various attacks.
Relevant credentials:
-
Local database password
-
Enable password
-
Line password
1.8 Self-Signed Certificate Lifetime
To enhance security, the default and supported validity of the device self signed certificate are changed:
-
Validity Range: 30 days to 1095 days (i.e. 3 years); was 30 days to 10 years
-
Default = 730 days (i.e 2 years); was 1 year
1.9 Real Time Clock
SKUs in this release support have an internal self-sufficient Real Time Clock (RTC) component that keeps time even when the device is shut down and not connected to a power source. This internal clock is initialized during manufacturing and can be updated by the time features of the device when the software clock is set (for example manually or via SNTP).
In a stack configuration – all units will sync with the master unit RTC. For more details on stack behavior see functional spec. Note: future releases of CBS may contain SKUs that do not support RTC – in this case a different unit (not the master) will be used as the system time source.
RTC is considered “reliable” for features that require a “reliable” time source: Time range settings; updating IP DHCP Snooping Database and scheduled reboot.
1.10 PNP Agent Enhancements
CBS 3.0 supports the configuration of HTTPS as 1st choice” transport protocol. Tesla 2.5.5 supported only HTTP as 1st choice transport protocol.
1.11 Stack Unit ID Indication
The stacking SKUs in this release do not support dedicated stacking LED(s). Therefore the system LED is used on these units to indicate stack unit ID, as follows:
-
Active unit – system LED will remain solid green (unless device is in bootup phase, or there is a HW fault or device is not connected to the power)
-
For member units - following completion of bootup phase and connection to the master unit, every 20 seconds the System LED will blink green according to unit ID of the member unit:
-
Unit 1 (if not active) – system LED will blink 1 time;
-
Unit 2 (if not active) – system LED will blink 2 times;
-
-
Unit 3 – system LED will blink 3 times;
-
Unit 4 – system LED will blink 4 times;
![]() Note |
Note: SKUs added in following releases may support dedicated stacking LEDs. |
1.12 Online Help (OLH) and Language File
Version 3.0.0.69 includes multiple fixes to OLH files. It also supports Chinese and Japanese language files.
1.13 CBD Probe Version 2.2.0.20200801
In version 3.0.0.69 the CBD Probe was upgraded to version 2.2.0.20200801.
Resolved Issues
|
Number |
Description |
|---|---|
|
CSCvv70507 |
Symptom In some rare cases, device active image is corrupted after reboot and will not load properly. |
Release Notes for Cisco Business 250 and 350 Series Switches - Software Version 3.0.0.61
August 2020
This Release Note describes the recommended practices and known issues that apply to software version 3.0.0.61 for the Cisco Business 250 and 350 Series Switches that include the following models:
|
Model |
Product Label |
|---|---|
|
CBS250-8T-E-2G |
8-Port Gigabit Smart Switch |
|
CBS250-8PP-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-8P-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-8FP-E-2G |
8-Port Gigabit PoE Smart Switch |
|
CBS250-16T-2G |
16-Port Gigabit Smart Switch |
|
CBS250-16P-2G |
16-Port Gigabit PoE Smart Switch |
|
CBS250-24T-4G |
24-Port Gigabit Smart Switch |
|
CBS250-24PP-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-24P-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-24FP-4G |
24-Port Gigabit PoE Smart Switch |
|
CBS250-48T-4G |
48-Port Gigabit Smart Switch |
|
CBS250-48PP-4G |
48-Port Gigabit PoE Smart Switch |
|
CBS250-48P-4G |
48-Port Gigabit PoE Smart Switch |
|
CBS250-24T-4X |
24-Port Gigabit Smart Switch with 10G Uplinks |
|
CBS250-24P-4X |
24-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS250-24FP-4X |
24-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS250-48T-4X |
48-Port Gigabit Smart Switch with 10G Uplinks |
|
CBS250-48P-4X |
48-Port Gigabit PoE Smart Switch with 10G Uplinks |
|
CBS350-8T-E-2G |
8-Port Gigabit Managed Switch |
|
CBS350-8P-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8P-E-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8FP-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-8FP-E-2G |
8-Port Gigabit PoE Managed Switch |
|
CBS350-16T-2G |
16-Port Gigabit Managed Switch |
|
CBS350-16T-E-2G |
16-Port Gigabit Managed Switch |
|
CBS350-16P-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-16P-E-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-16FP-2G |
16-Port Gigabit PoE Managed Switch |
|
CBS350-24T-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-24P-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-24FP-4G |
24-Port Gigabit PoE Managed Switch |
|
CBS350-48T-4G |
48-Port Gigabit Managed Switch |
|
CBS350-48P-4G |
48-Port Gigabit PoE Managed Switch |
|
CBS350-48FP-4G |
48-Port Gigabit PoE Managed Switch |
|
CBS350-24T-4X |
24-Port Gigabit Stackable Managed Switch with 10G Uplinks |
|
CBS350-24P-4X |
24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-24FP-4X |
24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-48T-4X |
48-Port Gigabit Stackable Managed Switch with 10G Uplinks |
|
CBS350-48P-4X |
48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
|
CBS350-48FP-4X |
48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks |
What's New in This Release
1.1 Browser and OS Support
The device web UI supports the following browsers and OS system:
-
Supported OS – MS Windows 7 (32 & 64 bit), MS Windows 10 (32 & 64 bit), MAC OS (not supported: MS Windows 8, 8.1, XP and Vista; Linux)
-
Supported Browsers – Chrome, Firefox and Microsoft Edge (Microsoft Internet Explorer not supported) – both for Windows and for MAC OS; Safari – MAC OS only.
1.2 Web GUI Style
The CBS 3.0 uses a new GUI style which is the PISA compliant.
1.3 Password Complexity
For enhanced security, the user does not have the option to disable the password complexity setting. The password complexity is supported with the following default and ranges:
-
Min-length – range 8-64, default = 8
-
Min-class – range 1-4, default = 3
-
No-repeat – range 1-16, default = 3
-
Not-current/not-username/not manufacturer = are always enabled
1.4 SSL Cipher Support
For enhanced security, support for the following Ciphers was removed:
-
RSA_WITH_AES_128_CBC_SHA256;
-
RSA_WITH_AES_128_GCM_SHA256;
-
RSA_WITH_AES_128_CCM_8;
-
RSA_WITH_AES_256_CCM_8
1.5 SSL Cipher Support
OpenSSL version upgraded from 1.1.0b to 1.1.0l (Lower case L).
1.6 Console Support
The following changes were introduced to the console support:.
-
SKUs in this release support both the RJ45 and mini USB console – mini USB has precedence.
-
CBS250 SKUs support console interface (In Tesla Product line the 250 SKUs did not support a console interface).
![]() Note |
Console support relates only to the SKUs in this release. SKUs in following releases support a single RJ45 interface, and the 250 product line SKUs do not support console. |
1.7 Password Encryption
In the previous version, the user’s credentials were saved to the config file and displayed using SHA-1 hash algorithm. In the current release, the user’s credentials are salted and hashed using PBKDF2 based on HMAC-SHA-512 hash. This adds additional security to the credentials and protects them from various attacks.
Relevant credentials:
-
Local database password
-
Enable password
-
Line password
1.8 Self-Signed Certificate Lifetime
To enhance security, the default and supported validity of the device self signed certificate are changed:
-
Validity Range: 30 days to 1095 days (i.e. 3 years); was 30 days to 10 years.
-
Default = 730 days (i.e 2 years); was 1 year.
1.9 Real Time Clock
SKUs in this release support have an internal self-sufficient Real Time Clock (RTC) component that keeps time even when the device is shut down and not connected to a power source. This internal clock is initialized during manufacturing and can be updated by the time features of the device when the software clock is set (for example manually or via SNTP).
In a stack configuration – all units will sync with the master unit RTC. For more details on stack behavior see functional spec. Note: future releases of CBS may contain SKUs that do not support RTC – in this case a different unit (not the master) will be used as the system time source.
RTC is considered “reliable” for features that require a “reliable” time source: Time range settings; updating IP DHCP Snooping Database and scheduled reboot.
1.10 PNP Agent Enhancements
CBS 3.0 supports the configuration of HTTPS as 1st choice” transport protocol. Tesla 2.5.5 supported only HTTP as 1st choice transport protocol.
1.11 Stack Unit ID Indication
The stacking SKUs in this release do not support dedicated stacking LED(s). Therefore the system LED is used on these units to indicate stack unit ID, as follows:
-
Active unit – system LED will remain solid green (unless device is in bootup phase, or there is a HW fault or device is not connected to the power).
-
For member units - following completion of bootup phase and connection to the master unit, every 20 seconds the System LED will blink green according to unit ID of the member unit:
-
Unit 1 (if not active) – system LED will blink 1 time;
-
Unit 2 (if not active) – system LED will blink 2 times;
-
-
Unit 3 – system LED will blink 3 times;
-
Unit 4 – system LED will blink 4 times;
![]() Note |
Note: SKUs added in following releases may support dedicated stacking LEDs. |
Known Issues
|
Number |
Description |
|---|---|
|
CSCvu81820 |
Symptom Fan status is showing OK even after disconnecting Fan from the SKU SG252X-4. WorkaroundNone. |
|
CSCvu81812 |
Symptom 100M SFP is not support on non-combo ports. WorkaroundNone. |
|
CSCvu81814 |
Symptom When a non-PD connects to a switch PoE port, PoE short counter increases and status show fault. WorkaroundDisable PoE at port level. |
|
CSCvu81816 |
Symptom Loopback detection shouldn't be triggered when pvst/rpvst is enable. WorkaroundNone. |
|
CSCvu81808 |
Symptom Edit ace several times via GUI cause the ace is deleted wrongly. WorkaroundNone. |
|
CSCvu81809 |
Symptom Apply/Remove ACL to/from port-channel and its member port cause traffic interrupt. WorkaroundNone. |
|
CSCvu81810 |
Symptom Fail to associate time-range with mac acl via GUI. WorkaroundNone. |
|
CSCvu81811 |
Symptom GUI: DUT take 45 seconds to configure spanning tree as PVST. WorkaroundNone. |
|
CSCvu81807 |
Symptom After I set permit ip source 10.10.10.1 service telnet gi1, Show management access-list Telnet. Only then it will not display port. WorkaroundNone. |
|
CSCvu81818 |
Symptom Fan RPM in CBS250-48T-4X is always showing 4075 after FAN disconnect. WorkaroundNone. |
|
CSCuu65516 |
Symptom If a language file fails to download (for example, due to a network problem), your Internet browser may display “incomplete/error information.” WorkaroundDelete your browser cookies and try again. The device can still be managed using Telnet. |
|
CSCuu65557 |
Symptom If the management session is using the device’s IPv6 address, and this is a secure session (HTTPS), the device cannot be managed using the Safari browser. WorkaroundEither use a different browser (such as Internet Explorer) or set up an insecure session (HTTP). |
|
CSCuq03628 |
Symptom An ISATAP client sends RS packets only when the tunnel interface is disabled, and then enabled. WorkaroundIn mixed devices applications, manually disable and enable the tunnel interface. |
|
CSCuu61125 |
Symptom The show VLAN command, for VLAN 1, shows non-present interfaces (port and stack units). WorkaroundThis is a display issue only. |
|
CSCuu61008 |
Symptom The show VLAN command, for VLAN 1, shows non-present interfaces (port and stack units). WorkaroundNone. |
|
CSCuy97946 |
Symptom DHCPv6 relay doesn't work if set destination to tunnel interface. WorkaroundUse IPv6 Global destination address as DHCPv6 destination. |
|
CSCuy97999 |
Symptom When using web based authentication and device DHCP server –unauthenticated station IP address is not expired after station sent DHCP release. WorkaroundWait till IP address expires after full lease expiration. |
|
CSCva97586 |
Symptom RSPAN - if traffic is duplicated to destination port due to mirror operation and another operation (for example regular forwarding) is performed at the exact same time – not all of the traffic is mirrored to RSPAN destination port. WorkaroundNone. |
|
CSCve55081/ CSCve55217 |
Symptom On specified devices, on certain ports – when no cable is connected, or cable length is very short, running Cable test via command “test cable-diagnostics tdr” may provide unpredictable results. WorkaroundNone. |
|
CSCve55094 |
Symptom Queue statistics. Packet size is calculated based on the packet size on ingress, although statistics themselves are egress statistics. WorkaroundNone. |
|
CSCvj32418 |
Symptom In rare scenario (adding 700 certain IPv6 routes) Hardware routing will be disabled – even though resource table is not full. WorkaroundConfigure less or different IPv6 routes. if issue occurs – reduce some routes that are not needed and reactivate HW based routing. |
|
CSCvp40302 |
Symptom Loopback detection is triggered when pvst/rpvst is enable, even though it shouldn’t. WorkaroundDo not enable Loopback detection together with PVST/RVPST. |
|
CSCvp40311 |
Symptom Cable-diagnostics tdr will always display "short cable" on 10G ports. WorkaroundNone. |
|
CSCvp40317 |
Symptom PSE port connected to pacific NICs (not PD device) will display status of “Short” condition. WorkaroundNone. |
|
CSCvq63060 |
Symptom Secure SSH file copy (from switch to SSH/SCP server) is not supported over SSH connection (where switch is the SSH server). WorkaroundUse console, telnet or web connection to perform secure SSH file copy from switch to SCP server. |
|
CSCvu16282 |
Symptom Cisco Business Dashboard Probe cannot connect to manager automatically after the primary stack switchover. WorkaroundReload the stack. |
|
CSCvu16298 |
Symptom PoE LED still light up after save "disable port LEDs" with reboot. WorkaroundNone. |
|
CSCvu24619 |
Symptom Backup unit in stack might reboot if Cisco Business Dashboard probe state is toggled between disable and enable within a few seconds. WorkaroundWait more than 10 seconds before toggling the Cisco Business Dashboard probe state. |
Cisco Business Online Support
For current support information, visit the pages given below:
|
Cisco Business |
|
|---|---|
|
Cisco Business Home |
|
|
Support |
|
| CBS250 Product Page | http://www.cisco.com/c/en/us/products/switches/business-250-series-smart-switches/index.html |
|
CBS350 Product Page |
https://www.cisco.com/c/en/us/products/switches/business-350-series-managed-switches/index.html |
|
Cisco Business Support Community |
http://www.cisco.com/go/cbcommunity |
| Cisco Business Support and Resources | http://www.cisco.com/go/smallbizhelp |
| Cisco Business Phone Support | http://www.cisco.com/go/cbphone |
| Cisco Business Chat Support | http://www.cisco.com/go/cbchat |
| Cisco Business Firmware Downloads | http://www.cisco.com/go/smallbizfirmware
Select a link to download the firmware for your Cisco product. No login is required. |
| Cisco Business Open Source Requests | If you wish to receive a copy of the source code to which you are entitled under the applicable free/open source license(s)
(such as the GNU Lesser/General Public License), please send your request to: external-opensource-requests@cisco.com.
In your request, please include the Cisco product name, version, and the 18 digit reference number (for example: 7XEEX17D99-3X49X08 1) found in the product open source documentation. |
Appendix
![]() Note |
Please note that Cisco suggests running the latest firmware on these switches to take advantage of the bug fixes and security updates that were included in the latest release. |
This section describes the various product IDs found in the CBS series switches, as well as the corresponding hardware revisions, and the minimum software version supported.
Hardware revision 03 and above for Americas (05 and above for rest of the world) support ACT2 chipset, which offers enhanced security features for the switches and as such, cannot support software version below 3.2.0.84. Earlier Hardware revisions (02 and below for Americas, 04 and below for Rest of the world) can be downgraded to software version below 3.2.0.84.
Should you want to downgrade the firmware on the device, compare the TAN value on the device sticker to the TAN number in the list below. If you can't find yours, it implies the firmware can be downgraded without limitation; otherwise, the restrictions listed in the table apply. The minimal firmware you can downgrade to for the devices in the table where the TAN value is not reported is 3.1.0.57, as indicated.
| Base SKU | Product Description | Regions | Hardware Version | TAN | Minimum Software |
| CBS250-8T-E-2G | 8-Port Gigabit Smart Switch | Americas | V03 | 74-123398-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123399-05 | 3.2.0.84 | ||
| CBS250-8PP-E-2G | 8-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123412-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123413-05 | 3.2.0.84 | ||
| CBS250-8P-E-2G | 8-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123414-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123415-05 | 3.2.0.84 | ||
| CBS250-8FP-E-2G | 8-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123416-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123417-05 | 3.2.0.84 | ||
| CBS250-16T-2G | 16-Port Gigabit Smart Switch | Americas | V03 | 74-123418-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123419-05 | 3.2.0.84 | ||
| CBS250-16P-2G | 16-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123420-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123421-05 | 3.2.0.84 | ||
| CBS250-24T-4G | 24-Port Gigabit Smart Switch | Americas | V03 | 74-123422-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123423-05 | 3.2.0.84 | ||
| CBS250-24PP-4G | 24-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123424-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123425-05 | 3.2.0.84 | ||
| CBS250-24P-4G | 24-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123426-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123427-05 | 3.2.0.84 | ||
| CBS250-24FP-4G | 24-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123428-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123429-05 | 3.2.0.84 | ||
| CBS250-48T-4G | 48-Port Gigabit Smart Switch | Americas | V03 | 74-123430-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123431-05 | 3.2.0.84 | ||
| CBS250-48PP-4G | 48-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123432-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123433-05 | 3.2.0.84 | ||
| CBS250-48P-4G | 48-Port Gigabit PoE Smart Switch | Americas | V03 | 74-123434-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123435-05 | 3.2.0.84 | ||
| CBS250-24T-4X | 24-Port Gigabit Smart Switch with 10G Uplinks | Americas | V03 | 74-123436-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123437-05 | 3.2.0.84 | ||
| CBS250-24P-4X | 24-Port Gigabit PoE Smart Switch with 10G Uplinks | Americas | V03 | 74-123438-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123439-05 | 3.2.0.84 | ||
| CBS250-24FP-4X | 24-Port Gigabit PoE Smart Switch with 10G Uplinks | Americas | V03 | 74-123440-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123441-05 | 3.2.0.84 | ||
| CBS250-48T-4X | 48-Port Gigabit Smart Switch with 10G Uplinks | Americas | V03 | 74-123442-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123443-05 | 3.2.0.84 | ||
| CBS250-48P-4X | 48-Port Gigabit PoE Smart Switch with 10G Uplinks | Americas | V03 | 74-123444-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123445-05 | 3.2.0.84 | ||
| CBS350-8T-E-2G | 8-Port Gigabit Managed Switch | Americas | V03 | 74-123446-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123447-05 | 3.2.0.84 | ||
| CBS350-8P-2G | 8-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123448-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123449-05 | 3.2.0.84 | ||
| CBS350-8P-E-2G | 8-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123450-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123451-05 | 3.2.0.84 | ||
| CBS350-8FP-2G | 8-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123452-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123453-05 | 3.2.0.84 | ||
| CBS350-8FP-E-2G | 8-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123454-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123455-05 | 3.2.0.84 | ||
| CBS350-16T-2G | 16-Port Gigabit Managed Switch | Americas | V03 | 74-123456-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123457-05 | 3.2.0.84 | ||
| CBS350-16T-E-2G | 16-Port Gigabit Managed Switch | Americas | V03 | 74-123458-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123459-05 | 3.2.0.84 | ||
| CBS350-16P-2G | 16-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123460-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123461-05 | 3.2.0.84 | ||
| CBS350-16P-E-2G | 16-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123462-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123463-05 | 3.2.0.84 | ||
| CBS350-16FP-2G | 16-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123464-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123465-05 | 3.2.0.84 | ||
| CBS350-24T-4G | 24-Port Gigabit Managed Switch | Americas | V03 | 74-123466-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123467-05 | 3.2.0.84 | ||
| CBS350-24P-4G | 24-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123468-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123469-05 | 3.2.0.84 | ||
| CBS350-24FP-4G | 24-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123470-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123471-05 | 3.2.0.84 | ||
| CBS350-48T-4G | 48-Port Gigabit Managed Switch | Americas | V03 | 74-123472-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123473-05 | 3.2.0.84 | ||
| CBS350-48P-4G | 48-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123474-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123475-05 | 3.2.0.84 | ||
| CBS350-48FP-4G | 48-Port Gigabit PoE Managed Switch | Americas | V03 | 74-123476-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123477-05 | 3.2.0.84 | ||
| CBS350-24T-4X | 24-Port Gigabit Stackable Managed Switch with 10G Uplinks | Americas | V03 | 74-123478-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123479-05 | 3.2.0.84 | ||
| CBS350-24P-4X | 24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks | Americas | V03 | 74-123480-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123481-05 | 3.2.0.84 | ||
| CBS350-24FP-4X | 24-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks | Americas | V03 | 74-123482-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123483-05 | 3.2.0.84 | ||
| CBS350-48T-4X | 48-Port Gigabit Stackable Managed Switch with 10G Uplinks | Americas | V03 | 74-123484-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123485-05 | 3.2.0.84 | ||
| CBS350-48P-4X | 48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks | Americas | V03 | 74-123486-03 | 3.2.0.84 |
| Rest of the World | V05 | 74-123487-05 | 3.2.0.84 | ||
| CBS350-48FP-4X | 48-Port Gigabit PoE Stackable Managed Switch with 10G Uplinks | Rest of the World | V05 | 74-123489-05 | 3.2.0.84 |
| CBS250-8T-D | 8-Port Gigabit Smart Switch | All | All | All | 3.1.0.57 |
| CBS250-8PP-D | 8-Port Gigabit PoE Smart Switch | All | All | All | 3.1.0.57 |
| CBS350-8S-E-2G | 8-Port Gigabit SFP Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24S-4G | 24-Port Gigabit SFP Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-8MGP-2X | 8-Port 2.5G PoE Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-8XT | 8-Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-12XT | 12 Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24XS | 24-Port 10G SFP+ Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-12XS | 12-Port 10G SFP+ Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-16XTS | 16-Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24XTS | 24-Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24XT | 24-Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-48XT-4X | 48-Port 10G Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-8MP-2X | 8-Port 2.5G PoE Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24MGP-4X | 24-Port 2.5G PoE Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-12NP-4X | 12-Port 5G PoE Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-24NGP-4X | 24-Port 5G PoE Stackable Managed Switch | All | All | All | 3.1.0.57 |
| CBS350-48NGP-4X | 48-Port 5G PoE Stackable Managed Switch | All | All | All | 3.1.0.57 |

Feedback