|
|
|
|
|
|
|
|
| Features in |
|
|
| 18 | ||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CR | Module | Level | Description |
| AR44x / AR450 | AR7x5 | AR750S |
| Rapier i |
| |||||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
CR00011510 | IPsec | 3 | The maximum SPI value has been increased in the commands: |
| Y | Y | Y |
| Y | Y | - |
| - | - | - | - | |
|
|
| create ipsec |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| outspi=spi [other parameters] |
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
| set ipsec |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| [other parameters] |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| The spi is now an integer in the range 256 to 4294967295. |
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
CR00011659 | TTY, VRRP | 3 | When VRRP debug was enabled from a telnet session, the debugging did not | Y | Y | Y |
| Y | Y | Y |
| Y | Y | Y | Y | ||
|
|
| stop when the telnet session closed. If the next telnet session got the same TTY |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| number as the closed session, VRRP debug output was displayed immediately the |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| session started. This made it possible for unauthorised users to view the debug |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| output. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
CR00011687 | BOOTP | 3 | The command set bootp relay maxhops is now supported, in addition to the | Y | Y | Y |
| Y | Y | Y |
| Y | Y | Y | Y | ||
|
|
| existing command set bootp maxhops. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
CR00011774 | Switch | 3 | The dot1qTpFdbPort MIB entry displays the ports on which the switch has | - | - | - |
| Y | Y | Y |
| Y | Y | Y | Y | ||
|
|
| learned MAC addresses. Previously, the switch started the list of ports at port 0 |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| instead of port 1. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
CR00011784 | IP Gateway | 3 | If the router received an ARP response for an address outside of the receiving | - | Y | - |
| - | - | - |
| - | - | - | - | ||
|
|
| interface's subnet, it discarded the ARP response. This is the intended behaviour |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| on some AR410 routers (see CR00010261) but not on AR7x5 routers. |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| This issue has been resolved. AR7x5 routers now forward such ARP responses. |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| ||
CR00011888 | Switch | 3 | When a trunk group on a | - | - | - |
| Y | Y | Y |
| Y | - | - | - | ||
|
|
| switch sometimes did not transmit traffic. The ports in each instance are: |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
| Models | First instance | Second instance |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| Rapier 48i, |
|
|
|
|
|
|
|
|
|
|
|
| ||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |||
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Version