Bug fixing : Asynchronous operation may generate a memory leak or out of bounds task allocation. A global asynchronous operation queue (max size is 300) is managed to limit the resources consumption and can be monitored in the Network window (Asynch field in the Queues group). Bug fixing : When PLC Link redundancy is configured, a memory leak may occur on communication timeout. Bug fixing : When Quick SetActiveState option is configured, a dead lock may occur when removing items referenced in pending asynchronous operations. Bug fixing : When No communication break option is configured, a crash may occur when updating items definition after a Control Expert application build change, whereas communication is degraded. Bug fixing : When adding the same item multiple times whereas data dictionary reloading is in progress, a crash may occur after updating the item definition on the fly (refer to SP2 enhancement use case) Bug fixing : Control Expert forced EBOOL instances were not be readable with synchronous or asynchronous operation. Bug fixing : An inconsistency may appear in the server Status window between Number of groups and Active groups information. Bug fixing : /Q devices may limit Modbus maximum number of registers to 59 instead of 125 Bug fixing : The server closure may hang when performed during a data dictionary reloading. Bug fixing : When system timestamping is configured with a huge number of event sources, the server may crash on bursts of events. Vulnerability fixing : Due to the end of support of Microsoft .Net Framework <= v4.6.1, the configuration tool targets Microsoft .Net Framework v4.8. The setup will fail if Microsoft .Net Framework v4.8 is not installed. Vulnerability fixing : Configurable batch file operated at server shutdown is no more supported Vulnerability fixing : The configuration tool may be the subject of reverse-engineering or code injection. Vulnerability fixing : The server may be the subject of out of bounds task allocation. It is fixed by limiting the number of OPC connections (300 max) and the number of OPC groups (1000 max). Vulnerability fixing : The usage of batch files ofsservice.bat (resp. ofsnoservice.bat) may be vulnerable and are no more installed. Run instead regofsservice /true (resp. regofsservice /false) in a command line to register (resp. unregister) the server as a service. Vulnerability fixing : Upgrade of Modbus SL and XIP communication drivers to v14.16.0.0. Vulnerability fixing : Upgrade of Zlib library to v1.3 (Copyright (C) 1995-2023 Jean-loup Gailly and Mark Adler) Enhancement : The server status window displays the current working set memory size (amount of physical memory in use by the process), followed in parenthesis by the maximum amount reached, and the commit size (amount of virtual memory reserved for the process). Enhancement : New policy when configuring alias Enhanced Adjustment Information. The parameters must be considered as follows : Reconnection retry number : The number of times the server attempts to resend a unsuccessful request to the device. Disconnection timeout : The duration (in minutes) for which the network connection is disabled if the device is disconnected (at startup or during operation). Note: if the device is still disconnected after the timeout expired, the timeout is renewed. Enhancement : Compatibility with Windows Server 2022 Data Center.
Fichiers
Nom du fichier | ||
EcoStruxure OFS DA 3.63 SP3 Integrity Verification Procedure.pdf
|
|
|
OFS_V3.63_4905_SP3_D.iso
|
|
|
OFS_V3.63_4905_SP3_L.iso
|
|
|
OFS_V3.63_4905_SP3_S.iso
|
|
|
OFS_V3.63_4905_SP3_W.iso
|
|
|
contents.html
|
|
Produits associés
Gamme(s)/Produit(s)