beautypg.com

Features in 86222-04 – Allied Telesis R800 Series User Manual

Page 27

background image

Patch 86222-22 For Rapier Switches and AR800 Series Modular Switching Routers

27

Patch 86222-22 for Software Release 2.2.2
C613-10319-00 REV U

When a VLAN was created and then destroyed on the G6 or G6F, the
VTABLE was corrupted. This has been fixed.

DHCP failed to send request messages when it was in a rebinding or
renewing state. This issue has been resolved.

In some extreme traffic conditions the switch could lock up, preventing
switching of any traffic. This issue has been resolved.

When large numbers of sessions were being handled the firewall would
become overly aggressive in restricting new sessions. The Active TCP Opens
field in the output of the SHOW FIREWALL POLICY would show a very
high number (42

× 10

8

). This issue has been resolved.

If the IGMP table was empty and a timeout was set, a fatal error occurred.
This issue has been resolved.

Features in 86222-04

Patch file details for Patch 86222-04 are listed in Table 18.

Patch 86222-04 includes all issues resolved and enhancements released in
previous patches for Software Release 2.2.2, and the following enhancements:

Message protection validation failures would occur intermittently. This
issue has been resolved.

ISAKMP now interoperates with other vendor’s products in aggressive
mode exchanges.

Support has been added for the 8624XL-80 switch with -48VDC power
supply.

PCR: 01179

Module: SWI

Network affecting: No

PCR: 01181

Module: DHCP

Network affecting: No

PCR: 01185

Module: SWI

Network affecting: No

PCR: 01186

Module: FIREWALL

Network affecting: No

PCR: 01187

Module: IPG

Network affecting: No

Table 18: Patch file details for Patch 86222-04.

Base Software Release File

86s-222.rez

Patch Release Date

24-Aug-2001

Compressed Patch File Name

86222-04.paz

Compressed Patch File Size

220220 bytes

PCR: 01124

Module: PKI

Network affecting: No

PCR: 01136

Module: ISAKMP

Network affecting: No

PCR 01138

Module: CORE, SWI

Network affecting: No