Allied Telesis AT-WA1104G-10 User Manual
Page 9

Features in 291-08
9
Version 291-10
C613-10488-00 REV G
CR00003495
Classifier
2
The following issues existed with classifiers:
■
classifiers matching protocol=ipv6 and ipprotocol=icmp could be
created more than once
■
classifiers matching protocol=ipv6 and ipprotocol=1 could be created
but were meaningless because 1 represents IPv4 ICMP
■
classifiers matching protocol=ip and ipprotocol=58 could be created
but were meaningless because 58 represents IPv6 ICMP.
These issues have been resolved.
Also, classifiers now default to protocol=ip (IPv4) if:
■
no value is specified for the protocol parameter, or
■
protocol=any and ipprotocol=icmp.
Y
Y
Y
Y
Y
Y
-
-
Y
Y
Y
CR00004018
VLAN
2
Removing then re-adding ports to a Nested VLAN, with rapid STP enabled,
caused the port in the Alternate Discarding state to leak a small number of
packets.
This issue has been resolved.
-
-
-
-
-
-
-
-
-
Y
-
CR00005472
BGP
2
When BGP was in the OpenSent state and it received an out-of-sequence
message (such as a KeepAlive message), BGP would return to the Idle state.
This issue has been resolved. BGP now sends a notification message to the
other BGP peer, as expected.
Y
Y
Y
Y
Y
Y
-
-
Y
Y
Y
CR00005812
IP Gateway
2
When the router or switch received an IP packet whose length was greater
than the MTU on the outgoing link, and the packet contained an IP option
that was not designed to be fragmented (such as Timestamp), then the
resulting constituent fragments would have incorrect IP header lengths.
This could lead to data corruption.
On routers, this issue applied to all routed packets. On switches, it applied
to packets processed by the CPU, not to packets switched in hardware.
This issue has been resolved.
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
Y
CR
Module
Level
Description
AR4
00
AR7
x5
AR7
x0S
Rap
ier i
Rap
ier w
AT
-8800
A
T-8
600
A
T-8
700
XL
x900
-48
A
T-
99
00
A
T-9
800