Download Release Notes for Patch 86261-09
Transcript
6 Patch Release Note PCR: 40058 Module: PORTAUTH Level: 3 The control parameter in the set portauth port supplicant command was incorrectly reflected in the dynamic configuration if that command was executed when port authentication was disabled. This issue has been resolved. PCR: 40059 Module: DVMRP Level: 2 DVMRP now interoperates with all Cisco IOS versions. PCR: 40062 Module: SWI Level: 3 If a mirror port was configured using the set swi port mirror command, and then the enable switch mirror command was entered, the switch would issue a warning that no mirror port had been set. This issue has been resolved. PCR: 40064 Module: SW56 Level: 2 Executing the reset switch command was causing the Rapier 48 switch to lockup. This issue has been resolved. PCR: 40067 Module: MNIX Level: 2 When using PPP multilink, many frames were being incorrectly marked as lost. Depending on the number of PPP links configured, this resulted in degraded performance and an occasional a loss of connectivity. This issue has been resolved. PCR: 40068 Module: SCR, TTY, USER Enhancement The switch has been enhanced to enable a text message to be displayed on the user’s console immediately after logging into the device. This message must be contained within an ASCII text file called login.txt and reside in flash memory. PCR: 40070 Module: CORE Level: 3 On AT-8800 series switches, a warning log message was generated for the fan’s status when there was more than a 20% variation in fan speed between “Actual” and “Expected”. This has been changed so the log message is only generated when the fan stops. PCR: 40071 Module: IPG Level: 2 Routing tables were not being updated correctly when better BGP routes were learnt. This issue has been resolved. PCR: 40076 Module: USER, PPP Level: 2 The calling-station ID was not being sent to Radius when authenticating a PPPoE connection. This issue has been resolved. PCR: 40079 Module: SWI Level: 3 When port authentication was enabled, the command enable switch port had no effect, when entered from the GIU, even when port authentication affecting parameters were set to default. This issue has been resolved. Patch 86261-09 for Software Release 2.6.1 C613-10388-00 REV J