beautypg.com

Allied Telesis AR800 Series User Manual

Page 8

background image

8

Patch Release Note

Patch 86231-10 for Software Release 2.3.1

C613-10328-00 REV J

Firewall subnet NAT rules were not working correctly from the private to
the public side of the firewall. Traffic from the public to private side
(destined for subnet NAT) was discarded. These issues have been resolved.
ICMP traffic no longer causes a RADIUS lookup for access authentication,
but is now checked by ICMP handlers for attacks and eligibility. If the ICMP
traffic matches a NAT rule, NAT will occur on inbound and outbound
traffic. HTTP 1.0 requests sometimes caused the firewall HTTP proxy to
close prematurely. Cached TCP sessions were sometimes not hit correctly.
These issues have been resolved.

If the command ADD FIREWALL POLICY RULE SOURCEPORT=ALL was
executed, a value of “65535” was incorrectly displayed for the
SOURCEPORT parameter for that rule in the SHOW FIREWALL POLICY
command. This issue has been resolved.

When the PPP ONLINELIMIT was exceeded for PPP over TDM, the PPP
link stayed open, allowing Link Quality Report (LQR) packets to be
transmitted. This caused the ifOutOctets counter to increment. Now, if the
ONLINELIMIT is exceeded, the link will close.

The SHOW VRRP command now shows the number of trigger activations
for the Upmaster and Downmaster triggers.

DHCP RENEW request messages are now unicast (as defined in the RFC),
not broadcast.

If a problem occurred with NVS, some critical files were lost. As a result, the
equipment was forced to load only boot ROM software at boot time. This
patch combined with the new version of the boot ROM software (pr1-1.2.0
for the AR700 series) resolves this issue.

The EPORT parameter in the SHOW SWITCH L3FILTER ENTRY command
was displaying incorrectly after an issue was resolved in PCR02374. The
command now displays correctly.

DHCP entry reclaim checks are now delayed by 10 seconds if the entry is
unroutable because the interface is not up.

Support for multi-homed interfaces has been added.

Under some circumstances a fatal error occurred if a large amount of data
was pasted onto the command line. This issue has been resolved.

PCR: 02241

Module: FIREWALL

Network affecting: No

PCR: 02300

Module: Firewall

Network affecting: No

PCR: 02376

Module: PPP

Network affecting: No

PCR: 02395

Module: VRRP, TRG

Network affecting: No

PCR: 02396

Module: DHCP

Network affecting: No

PCR: 02400

Module:
CORE,FFS,FILE,INSTALL,SCR

Network affecting: No

PCR 02408

Module: SWI

Network affecting: No

PCR: 02427

Module: DHCP

Network affecting: No

PCR: 02463

Module: DVMRP, IPG

Network affecting: No

PCR 02465

Module: TTY

Network affecting: No