Juniper Networks | NetScreen Release Notes |
|
|
•02384 – The device failed if you connected an Ethernet cable to the untrust interface in the
•02383 – Under some circumstances, the OSPF routing instance could not build an adjacency because its memory buffer was not large enough to handle large databases.
•02379 – You could not establish the Phase II portion of a VPN tunnel when you referenced a custom service that had spaces in its name with no quote marks around the string because ScreenOS did not recognize strings with spaces without quotes around the string.
•02377 – The Juniper
•02375 – The device was unable to detect and defend against a ping of death attack and would fail when these types of packets arrived at the device.
•02372 – You could not clear sessions on Juniper
•02370 – When you manually created a VPN tunnel in an NSRP environment in the WebUI, using an extra comma in the key portion of the set vpn command, the primary device failed while the backup device kept the old configuration.
•02368 – ScreenOS removed the quotation marks around the VPN name with a space when you configured an NHTB value on an interface.
•02364 – The device generated an unknown keyword error to the keyword all-
•02354 – Occasionally, the ScreenOS logging environment incorrectly displayed unusual logs that indicated a hacker attacked the device. A typical message that indicated a hacker was the following:
_prefix_c0000000_2_p72_ for ip address 192.0.0.0 in zone V1- Untrust has been deleted by netscreen via web from host 128.32.199.217 to 128.32.199.71:80 session
•02336 – In an NSRP
•02323 – When you ran FTP Put or Get commands to push or obtain data to or from the device, the WebUI always indicated the device had a Deny action in its policy even when the policy was configured to permit traffic.
ScreenOS | P/N | Page 22 of 42 |