Allied Telesis 86241-02 manual Features

Models: 86241-02

1 12
Download 12 pages 31.29 Kb
Page 2
Image 2

2

Patch Release Note

Features in 86241-02

Patch 86241-02 includes all issues resolved and enhancements released in previous patches for Software Release 2.4.1, and the following enhancements:

PCR: 02103

Module: SWI

Network affecting: No

IPX traffic passing between two switch instances using VLAN for Rapier48 now operates correctly.

PCR: 02210

Module: DNS Relay

Network affecting: No

Buffer leaks occurred when DNS relay was enabled. This issue has been resolved.

PCR: 02214

Module: IPG

Network affecting: No

A buffer leak occurred when a large number of flows (over 4000) were in use and needed to be recycled. This issue has been resolved.

PCR: 02220

Module: SWI

Network affecting: No

The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET SWITCH L3FILTER ENTRY commands was matching multicast and broadcast packets with software filtering. This issue has been resolved.

PCR: 02236

Module: FIREWALL

Network affecting: No

Sometimes the retransmission of an FTP packet was not permitted through the Firewall. This issue has been resolved.

PCR: 02245

Module: VRRP

Network affecting: No

VRRP returned an incorrect MAC address for an ARP request. This issue has been resolved.

PCR: 02263

Module: VRRP

Network affecting: No

The virtual MAC address was used as the source MAC for all packets forwarded on an interface associated with a Virtual Router (VR). This was confusing when multiple VRs were defined over the same interface because only one virtual MAC address was ever used. The other virtual MAC addresses (for the other VR's) were only used if the source IP address matched the VR’s IP address. To avoid this confusion, the system MAC address is now always used unless the source IP address of the packet is the same as the VR’s IP address.

PCR: 02267

Module: BGP

Network affecting: No

When route aggregation was enabled, the atomic aggregate was not being set. This issue has been resolved.

PCR: 02268

Module: FIREWALL

Network affecting: No

HTTP requests from a fixed IP address were erroneously reported as a host scan attack in the Firewall deny queue. This issue has been resolved.

Patch 86241-02 for Software Release 2.4.1 C613-10340-00 REV B

Page 2
Image 2
Allied Telesis 86241-02 manual Features