beautypg.com

Allied Telesis AR800 Series User Manual

Page 22

background image

22

Patch Release Note

Patch 86231-10 for Software Release 2.3.1

C613-10328-00 REV J

When pinging to a remote IP address with two or more different cost routes,
if the preferred route became unavailable, the ping failed to switch to the
less preferred route until the ping was stopped and restarted. This issue has
been resolved.

When the command SH SWI PORT ? was entered, the parameter options
VLAN and SOCK were displayed. They should not have been because they
are not valid parameters for the command. Executing the command with
the SOCK parameter caused a fatal error. These issues have been resolved.

When a Rapier was restarted the IP address of the domain name server was
not displayed on the IP General GUI page. This issue has been resolved.

When an STP instance was enabled for the first time on a Rapier 48, BPDU
transmission on ports 25-48 was delayed for up to 30 seconds. STP BPDUs
are now transmitted as soon as the STP instance is enabled.

The IP, MASK, and ACTION parameters could not be set with the SET IP
ROUTE FILTER command. This issue is resolved when the filter number is
specified at the start of the command, for example:

SET IP ROUTE FILTER=filter-id IP=ipadd MASK=ipadd

ACTION={INCLUDE|EXCLUDE}

where: filter-id is the filter number. Filter numbers are displayed in the
output of the SHOW IP ROUTE FILTER command.

A port that was deleted from a VLAN continued to switch packets, and
entries remained in the ARP and LAYER 3 hardware tables when they
should have been removed. These issues has been resolved.

Logging out of a Secure Shell session sometimes caused a restart. This issue
has been resolved.

The firewall was blocking outbound ICMP packets when the associated
private interface had a ‘deny all’ rule. The forwarding of packets is now
controlled by the ICMP_FORWARDING and PING parameters.

The ISAKMP main and aggressive exchanges could get stuck in the KE sent
state if an SA message was received from the remote device when a KE
message was expected. This issue has been resolved.

PCR: 02116

Module: IPG PING

Network affecting: No

PCR: 02118

Module: SWI

Network affecting: No

PCR: 02120

Module: IPG

Network affecting: No

PCR: 02121

Module: SWI

Network affecting: No

PCR: 02123

Module: IPG

Network affecting: No

PCR: 02130

Module: SWI

Network affecting: No

PCR 02135

Module: SSH

Network affecting: No

PCR 02136

Module: FIREWALL

Network affecting: No

PCR 02137

Module: ISAKMP

Network affecting: No