
Patch 86261-07 For Rapier and AT-8800 Series Switches SHOW IGMPSNOOPING ROUTERADDRESS 15
Patch 86261-07 for Software Release 2.6.1
C613-10388-00 REV G
• ADD USER
• SET USER
• DELETE USER
• PURGE USER
• ENABLE USER
• DISABLE USER
• RESET USER
This issue has been resolved. Security officer privilege is now required for
these commands when security mode is enabled with the ENABLE
SYSTEM SECURITY_MODE command.
Some issues occurred on 48 port Rapier series switches when MAC
addresses were learned and then relearned on a different port. These issues
have been resolved.
Tagged ports did not tag packets received from the bridge before
transmitting them. This issue has been resolved.
When static port security was enabled with the RELEARN parameter in the
SET SWITCH PORT command, and a switch port was reset or unplugged,
the MAC entries were removed (unlearned) from the forwarding database
table. The MAC entries should only be removed when dynamic port
security is in use. This issue has been resolved.
A device in a supplicant role failed to authenticate if it used EAP-MD5
encryption with Windows 2000 or 2003 Server as the RADIUS server. Also,
a fatal error occurred if the device received EAPOL packets containing a
very large value in the packet length field. These issues have been resolved.
Syslog entries did not contain the date, time and unique identifier of the
message source. This issue has been resolved. The CREATE LOG OUTPUT
and SET LOG OUTPUT commands have been modified to control whether
or not this information is included.
The following parameter has been added to the CREATE LOG OUTPUT
and SET LOG OUTPUT commands:
[SYSLOGFORMAT=NORMAL|EXTENDED]
If the SYSLOGFORMAT parameter is set to EXTENDED the date, time and
unique identifier of message source are included in the syslog message. If
the parameter is set to NORMAL, this information is not included in the
syslog message. The default is NORMAL.
When IP multicasting was not enabled, all IP multicast packets were passed
to the CPU, causing overloading. This issue has been resolved. Now, if IP
multicasting is not enabled, these packets are not sent to the CPU.
PCR: 31184 Module: SW56 Level: 2
PCR: 31185 Module: SWI Level: 2
PCR: 31190 Module: SWI, SW56 Level: 2
PCR: 31191 Module: PORTAUTH, USER Level: 2
PCR: 31192 Module: LOG Level: 3
PCR: 31193 Module: IPG Level: 2
Kommentare zu diesen Handbüchern