Allied Telesis 86253-07 User Manual
Page 7

Patch 86253-07 For Rapier Series Switches
7
Patch 86253-07 for Software Release 2.5.3
C613-10382-00 REV E
On AT-8800 series switches, strict QoS scheduling is now enforced for ports
where egress rate limiting is applied. On Rapier i series switches, the same
QoS setup is now applied to all of the appropriate ports when setting up
egress rate limiting.
If an IPv6 filter that blocked traffic on a VLAN interface was removed, the
traffic was still blocked. This issue has been resolved.
The SMTP proxy did not correctly filter sessions where messages were
fragmented. This had the potential to prevent the detection of third-party
relay attacks. This issue has been resolved.
The AUTHENTICATION parameter has been removed from the “?” CLI
help for firewall commands. This was not a valid parameter.
Occasionally some firewall timers stopped early, resulting in sessions being
removed prematurely. Because of this, TCP Reset packets could be sent by
the firewall before TCP sessions were finished. This issue has been resolved.
When policy-based routing was active, IP packets not matching any policy-
specific routes were forwarded, even if there was no default policy route.
This issue has been resolved. Now, a route whose policy exactly matches the
policy of the packet is selected. If an exact match does not exist, a route with
the default policy will be used to route the packet. If no route is found, the
packet is discarded. The TOS field in incoming IP packets is ignored, so
packets with the TOS value set are forwarded using a route with the default
policy.
Sometimes the device rebooted when a severe multicast storm occurred due
to a loop in the network. This issue has been resolved.
If a SHOW command that displayed a lot of information, such as SHOW
DEBUG, was executed when the device’s free buffer level was very low, the
device sometimes became unresponsive. This could also occur if many
SHOW commands were executed through a script. This issue has been
resolved.
The server string was not copied correctly into an HTTP file request when
loading information from the configuration script. This issue has been
resolved.
PCR: 03953
Module: SW56
Level: 3
PCR: 03970
Module: IPV6
Level: 3
PCR: 03982
Module: FIREWALL
Level: 3
PCR: 03993
Module: FIREWALL
Level: 4
PCR: 03996
Module: FIREWALL
Level: 2
PCR: 03997
Module: IPG
Level: 3
PCR: 31002
Module: UTILITY
Level: 2
PCR: 31004
Module: TTY
Level: 2
PCR: 31009
Module: HTTP
Level: 3