i
Contents
Introduction ·····················································································1
List of severe vulnerabilities ································································1
Version information ···········································································2
Hardware feature updates ··································································6
Software feature and command updates ···············································7
MIB updates ····················································································7
Operation changes ···········································································8
Restrictions and cautions ···································································8
Open problems and workarounds ························································9
List of resolved problems ···································································9