Patch | 13 |
PCR: 02039 | Module: IPG | Network affecting: No |
The SHOW IP ROUTE FILTER command output displayed counters for 'passes' and 'include' that were the same. This issue has been resolved. Counters now increment only when a filter is active and do not count interface routes.
PCR: 02040 | Module: SWI | Network affecting: No |
PCR 02019 permitted the reception of packets by the CPU that should have been discarded. This issue has been resolved.
PCR: 02057 | Module: FIREWALL | Network affecting: No |
Firewall TCP timeout values have been reduced for sessions placed in the CLOSED state after receiving a TCP/RESET. This applies to the stateful inspection of firewall sessions only, and not to the TCP module. Previously, PCR 01263 reduced the timeout value for sessions placed in the CLOSED state after a TCP/FIN packet was received.
PCR: 02063 | Module: FIREWALL | Network affecting: No |
Firewall IP access lists were not working correctly. If an IP range was specified without spaces between the IP address and the separating
Features in
Patch file details for Patch 86222-13 are listed in Table 8.
Table 8: Patch file details for Patch
Base Software Release File | |
|
|
Patch Release Date | |
|
|
Compressed Patch File Name | |
|
|
Compressed Patch File Size | 328884 bytes |
|
|
Patch
PCR: 02014 | Module: TELNET | Network affecting: No |
When a Telnet session was terminated without a proper logout, counters recording the number of logins were not correctly decremented. This issue has been resolved.
PCR: 02019 | Module: SWI | Network affecting: No |
If a layer 3 hardware filter for a particular packet type (e.g. Netbeui) was configured, all IP packets destined for the CPU were discarded. This issue has been resolved.
Patch