|
|
|
|
|
|
| Features in |
|
|
| 61 | ||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR | Module | Level | Description | AR400 | AR7x5 | AR7x0S |
| Rapier i | AT8800- |
| x90048- | ||||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR00013592 | HTTP | 2 | A badly formed response from a particular HTTP server caused the router or | Y | Y | Y |
| Y | Y | Y |
| Y | Y | Y | Y |
|
|
| switch to reboot when it attempted to load a |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR00013700 | IP Gateway | 2 | When an IP packet was queued by the ENCO module or other applications, and | Y | Y | Y |
| Y | Y | Y |
| Y | Y | Y | Y |
|
|
| the IP flow for the packet became invalid while the packet was queued, the |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| router or switch sometimes rebooted. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR00013791 | IGMP, VLAN | 2 | Disabling IGMP snooping correctly increased the number of L3 filter matches | – | – | – |
| Y | Y | Y |
| Y | – | – | – |
|
|
| available. However, if the configuration was saved and then run after a reboot, |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| the switch incorrectly limited the number of L3 filter matches to the number |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| available when IGMP snooping was enabled. If the maximum number of matches |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| had been configured, this meant that some matches were missing after a reboot. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR00013823 | Switch | 2 | In very rare circumstances, a port could stop transmitting traffic if its speed was | – | – | – |
| – | – | – |
| – | – | – | Y |
|
|
| modified or it was reset while under heavy traffic load. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
CR00013929 | ADSL | 2 | When performing RFC1483 encapsulation of Ethernet frames, the AR44xS | Y | – | – |
| – | – | – |
| – | – | – | – |
| ATM |
| routers did not pad frames out to the |
|
|
|
|
|
|
|
|
|
|
|
|
| Ethernet |
| not require such padding to be performed). This resulted in an interoperability |
|
|
|
|
|
|
|
|
|
|
|
|
|
| issue with ATM switches that discarded (rather than padded) the undersize |
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
|
|
| frames upon decapsulating them. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| The effect of this was that when an AR44xS router was connected to an ATM |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| network that contained such switches, the router could fail to connect at the PPP |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| session level. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| This issue has been resolved. The router now always pads undersize Ethernet |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| frames to the |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| encapsulation. This avoids the possibility of this interoperability issue. |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Version