6

Patch Release Note

PCR: 02530

Module: FIREWALL

Network affecting: No

The GBLIP parameter in the ADD FIREWALL POLICY RULE ACTION=NONAT command is optional. However, if the command was executed without the GBLIP parameter set, the command erroneously failed after a CREATE CONFIGURATION command was executed. This issue has been resolved.

PCR: 03111

Module: FIREWALL

Level: 1

TCP sessions could fail if the public side of the firewall was using Kerberos and the private side had a very slow connection to the firewall. This issue has been resolved.

PCR: 03134

Module: TCP

Level: 2

When using the SET TELNET LISTENPORT command, a fatal error sometimes occurred. This issue has been resolved.

PCR: 03135

Module: SWI

Level: 2

The TYPE parameter in the SET SWITCH L3FILTER command was not written to the script file correctly if MATCH was set to NONE. This issue has been resolved.

PCR: 03143

Module: VRRP

Level:

When the PRIORITY parameter in the SET VRRP command was changed, it was not set correctly when a link was reset. This issue has been resolved.

PCR: 03145

Module: IPG

Level: 4

The SET IP ROUTE FILTER command was not processing some parameters.

This issue has been resolved.

PCR: 03148

Module: IPG

Level: 3

If the Gratuitous ARP feature was enabled on an IP interface, and an ARP packet arrived, (either ARP request, or reply) that had a Target IP address that was equal to the SenderIP address, then the ARP cache was not updated with the ARP packet’s source data. This issue has been resolved.

PCR: 03160

Module: STP

Level: 2

Executing the PURGE STP command caused fatal error. This issue has been resolved.

PCR: 03171

Module: DVMRP, IPG

Level: 3

DVMRP was erroneously forwarding packets to a VLAN with a

 

downstream neighbour. This issue has been resolved.

 

PCR: 03173

Module: CORE, NTP

Level: 3

The default NTP polling interval was set to 64 seconds, not the correct interval of 128 seconds. This issue has been resolved.

PCR: 03174

Module: IPG

Level: 2

This PCR corrects issues that arose with PCR 02203. When the DNS request forwarding queue failed to accept a new DNS request message (possibly due to overloading), an attempt was made to close the UDP sessions for both the primary and secondary name servers. This caused a restart if either

Patch 86222-27 for Software Release 2.2.2 C613-10319-00 REV Z

Page 6
Image 6
Allied Telesis 86222-27 manual PCR Module TCP Level, PCR Module Vrrp Level