Allied Telesis AR800 Series User Manual
Page 26
26
Patch Release Note
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Firewall IP access lists were not working correctly. If an IP range was
specified without spaces between the IP address and the separating '-' the
range would be ignored. Spaces are no longer required. Also, matches were
made to addresses covered by a range in an access list if the matching range
was numerically the lowest in the list. This issue has been resolved.
After increasing the switch’s STP priority, the Designated Root information
was not updated. This issue has been resolved.
The TickTimer ran one percent slower than it should have. This issue has
been resolved.
When a NTP packet was received from an NTP server (mode 4) the router
acted as a client, and sent a reply back to the server, but did not remove the
peer association. This meant that the Dynamic Peers list, viewed using the
SHOW NTP command, displayed incorrect dynamic peer associations. This
issue has been resolved.
If ingress bandwidth limiting was set below 1000, ICMP (ping) packets were
no longer passing through the switch. This issue has been resolved. Also, if
packet debugging was enabled, and a packet received on a VLAN was for
another VLAN, the packet was not displayed by debug before it was
dropped. This issue has been resolved.
ARP was not completing when an interface was down. This issue has been
resolved.
OSPF virtual links running across a single network segment would accept
0.0.0.0 as the next hop address. This was inherited by derivative routes,
making them unusable. This issue has been resolved.
The following issues have been resolved:
•
The GUI suffered a fatal error when multiple users browsed to single-
user pages.
•
It was not possible to modify port settings.
•
“Enable” and “disable” GUI handlers were not working correctly.
•
Incorrect commands were not dealt with correctly, locking the GUI.
•
The layer 3 “modify” buttons were not working correctly.
•
“Remove” buttons attempted to operate if no selection was made.
•
“Modify” pages did not show any data.
Also, support has been added for the Rapier 16i, 24i and 48i models.
PCR: 02063
Module: FIREWALL
Network affecting: No
PCR: 02066
Module: STP
Network affecting: No
PCR: 02070
Module: CORE
Network affecting: No
PCR: 02071
Module: NTP
Network affecting: No
PCR: 02076
Module: SWI, VLAN
Network affecting: No
PCR: 02078
Module: IPG
Network affecting: No
PCR: 02082
Module: OSPF
Network affecting: Yes
PCR: 02083
Module: IPG
Network affecting: No