ページ1に含まれる内容の要旨
Patch Release Note
Patch sr264-03
for AT-8600 series switches
Introduction
This patch release note lists the issues addressed and enhancements made in
patch sr264-03 for Software Release 2.6.4 on existing models of AT-8600 series
switches. Patch file details are listed in Table 1.
Table 1: Patch file details for Patch sr264-03.
sr-264.rez
Base Software Release File
30-July-2004
Patch Release Date
sr264-03.paz
Compressed Patch File Name
40912 bytes
Compressed Patch File Size
This release note s
ページ2に含まれる内容の要旨
2 Patch Release Note Some of the issues addressed in this Release Note include a level number. This number reflects the importance of the issue that has been resolved. The levels are: Level 1 This issue will cause significant interruption to network services, and there is no work-around. Level 2 This issue will cause interruption to network service, however there is a work-around. Level 3 This issue will seldom appear, and will cause minor inconvenience. Level 4 This issue represents a cosme
ページ3に含まれる内容の要旨
Patch sr264-03 for AT-8600 series switches 3 PCR: 40417 Module: OSPF Level: 3 When LS Acks (Link State Advert acks) were received, they were compared against the transmitted LSA (Link State Advert). If it was the same, the LSA was removed from the re-transmission list. The algorithm used in this check has been changed to be compliant with the algorithm specified in section 13.1 of RFC2328, to determine if the LS Ack received is the instance as the LSA. PCR:
ページ4に含まれる内容の要旨
4 Patch Release Note Features in sr264-02 Patch file details are listed in Table 2. Table 2: Patch file details for Patch sr264-02. sr-264.rez Base Software Release File 06-July-2004 Patch Release Date sr264-02.paz Compressed Patch File Name 9288 bytes Compressed Patch File Size Patch sr264-02 includes the following resolved issues and enhancements: PCR: 40360 Module: SWITCH Level: 3 Factory LED tests (enable/disable switch led test for AT-8800 series switches
ページ5に含まれる内容の要旨
Patch sr264-03 for AT-8600 series switches 5 The Authentication Server The authentication server verifies the supplicant’s details, passed to it by the authenticator. This implementation of 802.1x control requires that a port acting as an authenticator must communicate with a RADIUS authentication server. The RADIUS server must be capable of receiving and deciphering EAP in RADIUS packets. The authentication server must be connected to a port on the switch which does not have port authenti
ページ6に含まれる内容の要旨
6 Patch Release Note 7. When the supplicant sends an EAPOL-Logoff message to the authenticator the port under 802.1x control is set to unauthorised. A successful authentication message exchange, initiated and ended by a supplicant using OTP authentication, is shown in below. To minimise the risk of denial-of-service attacks by issuing EAPOL-Logoff messages to an Authenticator Port Access Entity (PAE) from a third party device, we recommend that 802.1x not be used in a shared media LAN. Figu