Allied Telesis AT-WA1104G-10 manual Vpn, Gui

Page 11

 

 

 

 

 

 

 

 

Features in 291-08

 

 

 

11

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR

Module

Level

Description

AR400

AR7x5

AR7x0S

Rapier i

 

Rapier w

AT8800-

AT-8600

 

AT-8700XL

x90048-

AT-9900

AT-9800

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00010967

PPP

2

If the router or switch received an LCP packet with an unrecognised

Y

Y

Y

Y

 

Y

Y

-

 

-

Y

Y

Y

 

 

 

protocol, it responded with a ProtocolReject packet of incorrect length that

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

did not respect the established MRU of the peer.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00010968

PPP

2

When the established Maximum Receive Unit (MRU) of the remote PPP peer

Y

Y

Y

Y

 

Y

Y

-

 

-

Y

Y

Y

 

 

 

was greater than the established MRU of the local PPP peer, Echo Reply

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

packets did not respect the established MRU of the remote peer.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00011231

Core

2

In most circumstances the stack dump for an AR7x5 router was invalid and

-

Y

-

-

 

-

-

-

 

-

-

-

-

 

 

 

did not contain complete information about the cause of a reboot.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00012218

VPN, GUI

2

Enabling VPN (IPsec) on the GUI caused the GUI VPN page to stop

Y

-

Y

-

 

-

-

-

 

-

-

-

-

 

 

 

displaying information about some or all of the existing VPN policies.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00012727

OSPF

2

Sometimes when a type 7 external LSA was translated to a type 5 external

Y

Y

Y

Y

 

Y

Y

Y

 

Y

Y

Y

Y

 

 

 

LSA the forwarding address was set to 0.0.0.0 in the translated type 5 LSA.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved, so that the forwarding address is always

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

copied from the type 7 LSA being translated.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

CR00012751

OSPF

2

When the router or switch is acting as an area border router and one of the

Y

Y

Y

Y

 

Y

Y

Y

 

Y

Y

Y

Y

 

 

 

areas is an NSSA (Not So Stubby Area), the router or switch will create a

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

default route for the NSSA and inject this into the NSSA. Previously, the

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

router or switch was also redistributing this route into other areas as a static

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

route when static route redistribution was turned on. This was not desirable

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

behaviour.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This issue has been resolved.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Version 291-10

C613-10488-00 REV G

Image 11
Contents Models Series Release File Date Size bytes GUI file Maintenance VersionEnabling and Installing this Release Enabling and Installing this ReleaseLevels3 LevelsIP Gateway SwitchingSnooping CR00018693 ModuleCR00018663 CR00018691CR00018514 CR00018530 Module Level Description CR00001231 Policy attack command CR00000444 CR00000484Vlan Protocol=any and ipprotocol=icmpInstall, MIB VPN, GUI TTY Create configIgmp PIM6 Isakmp CR00017081 CR00016985ATM CR00016989CR00017256 CR00017226CR00017227 CR00017255CR00017488 CR00017368QoS CR00017456CR00017662 CR00017518CR00017634 CR00017659PIM Show config dynam or saved by the command create configCommand add fire policy=name rule=number act=allow int=int GUI FileBridge Install, Snmp Install CR00011259 CR00010979CR00010984 CR00011223Conf dyn=ip PingMaxttl CR00013494CR00013543 CR00013635CR00014137 CR00013832CR00013920 CR00014103CR00015466 CR00014304CR00014330 CR00014879CR00016925 CR00016452CR00016578 CR00016735GUI, Switch AuthenticationMacff CR00012822Process counters CR00016099Radius CR00017701 CR00017482CR00017532 WAN LoadCR00018039 Have been. This could cause serious routing issuesCR00017869 Carried out correctlyEnhancements CR00011533 You enable the firewall session licenseCR00007737 CR00010003CR00013527 CR00012980CR00013041 CR00013500CR00015822 CR00015569CR00015592 CR00015736DHCPv6 SYN ConfigGUI, Firewall CR00016394 CR00016364CR00016365 CR00016379CR00016621 CR00016489CR00016526 CR00016576Isdn CR00017031 CR00016940CR00016941 CR00017006VLAN, Igmp CR00017257 CR00010518 System temperature commandCR00008225 CR00009036PIM, PIM6 Asyn Switch, MIBCR00016799 CR00016228CR00016463 Type=temporaryCR00015543 CR00000396CR00011560 CR00013976ADSL, GUI CR00014288CR00014667 CR00015432CR00016221 CR00016150Create isakmp policy=name other parameters Address of the policyCu SFPs CR00016234CR00016285 CR00016361CR00016523 CR00016459Status in the entry labelled Main fan CR00016977 CR00016758CR00016776 CR00016785CR00013963 CR00013787Logging CR00013813CR00010511 Was enabled enable bgp autosoftupdateCR00014145 CR00016314Ethernet IGMP, VlanCR00014323 CR00014228CR00014269 CR00014298CR00014834 CR00014714CR00014748 CR00014795Switch, Macff CR00015638 CR00015348CR00015396 CR00015474CR00015937 CR00015936CR00015949 CR00015971CR00009302 CR00007000GUI, Igmp CR00009274CR00012493 Using igmpproxy=offCR00010136 CR00012230CR00013150 CR00012585CR00012832 CR00012858CR00014047 CR00013629CR00013694 CR00014038GUI, Log CR00014724 CR00014328CR00014652 CR00014659PIMv6 CR00015258 CR00015148CR00015155 CR00015159CR00015915 CR00015666CR00015798 CR00016058Core, Utility Disable debug activeCR00004677 CR00009087CR00013188 CR00012602CR00013045 CR00013112CR00013640 Command create config, set summertime came before enableCR00013463 CR00013589Ddns CR00015080 CR00014750CR00014778 VLAN, BridgingMany CR00014067 Main chassis fan in the output of the show system commandCR00013992 Ways System LED flashes in a single flash patternCR00014238 DELete BOOTp RELAy=ipadd INTerface=interfaceCommand SHow BOOTp RELAy CR00014172CR00014241 CR00014354 CR00014300MAC-forced forwarding CR00014728 CR00014715DNS CR00015628 CR00014845CR00015269 CR00015585 Caused the switch to reboot This issue has been resolvedCR00014960 CR00015102CR00014306 CR00015678CR00013270 Queues of buffer resourceCR00015510 CR00014959Associated with that traffic class or flow group SnoopingIgmp queries, PIM messages, Ospf messages, and RIP messages CR00014222Support for the new x900-48FS switch-CR00016662 Support for the new x900-48FS switch-CR00016662Igmp snooping fast leave in multiple host mode-CR00017482 Igmp snooping fast leave in multiple host mode-CR00017482Igmp Snooping Support for the new Rapier 48w switch Support for the new Rapier 48w switchBacking up the configuration with SNMP-CR00016221 Backing up the configuration with SNMP-CR00016221Set the load parameters Upload the file Snmp ASN.01 BER Padding-CR00016523 Bits Value decimal Value hex Asnberpadding setting Encoding