Patch | 9 |
PCR: 02263 | Module: VRRP | Network affecting: No |
The virtual MAC address was used as the source MAC for all packets forwarded on an interface associated with a Virtual Router (VR). This was confusing when multiple VRs were defined over the same interface because only one virtual MAC address was ever used. The other virtual MAC addresses (for the other VR's) were only used if the source IP address matched the VR’s IP address. To avoid this confusion, the system MAC address is now always used unless the source IP address of the packet is the same as the VR’s IP address.
PCR: 02264 | Module: PIM, DVMRP, SWI | Network affecting: No |
PIM or DVMRP failed to see any data if IGMP snooping was on and DVMRP or PIM was enabled after the data stream had reached the router/ switch. This issue has been resolved.
PCR: 02265 | Module: FIREWALL | Network affecting: No |
MAC address lists were not working with Firewall rules. This issue has been resolved.
PCR: 02268 | Module: FIREWALL | Network affecting: No |
HTTP requests from a fixed IP address were erroneously reported as a host scan attack in the Firewall deny queue. This issue has been resolved.
PCR: 02269 | Module: DUART, TM | Network affecting: No |
Under certain circumstances, the Asyn Loopback Test failed. This issue has been resolved.
PCR: 02274 | Module: TPAD | Network affecting: No |
ARL message interrupts have been
PCR: 02275 | Module: OSPF | Network affecting: No |
Some routes were not added into the OSPF route list, and therefore were not added into the IP route table. This issue has been resolved.
PCR: 02276 | Module: FIREWALL | Network affecting: No |
The CREATE CONFIG command did not save the SOURCEPORT parameter to the configuration file when the low value of the source port range was set to zero. This issue has been resolved.
PCR: 02287 | Module: IPG | Network affecting: No |
Existing IGMP groups were not deleted when IGMP was disabled globally or on the associated interface. This gave the groups very high timeout values. This issue has been resolved.
PCR: 02299 | Module: VRRP | Network affecting: No |
If a packet with a destination IP address equal to a VRRP IP address was received when the router didn’t own the IP address, (because it didn’t have an interface with that IP address) the router incorrectly tried to forward the packet and send an ICMP “redirect” message to the source. Now, if such a packet is received, it will be discarded and an ICMP “host unreachable” message will be sent to the source.
Patch