Patch 86251-05 For Rapier Switches and AR800 Series Modular Switching Routers

3

PCR: 03270

Module: SWI

Level: 3

The inter-packet gap has been reduced by 4 bytes on the Rapier 48i stacking link. This allows for non-blocking operation with tagged packets.

PCR: 03299

Module: IKMP

Level: 2

Under some circumstances, ISAKMP suffered a fatal error if more than 8 SA proposals were presented. This issue has been resolved.

PCR: 03314

Module: SWI

Level: 2

Layer 3 filters that matched TCP or UDP port numbers were being applied to the second and subsequent fragments of large fragmented packets. This issue has been resolved.

PCR: 03354

Module: FIREWALL

Level: 3

The SET FIREWALL POLICY RULE command was not accepting the value 24:00 (midnight) for the BEFORE parameter. This issue has been resolved.

PCR: 03371 Module: DHCP

Level: 3

A minimum lease time can no longer be specified when creating a DHCP policy. This complies with RFC 2131.

PCR: 03383

Module: IPG

Level: 2

If there were a large number of routes in the route table, and the SHOW IP ROUTE command was executed, the device stopped operating. This issue has been resolved.

PCR: 03390

Module: HTTP

Level: 2

Occasionally a fatal error occurred when the GUI browser started or a page was refreshed. This issue has been resolved.

PCR: 03392

Module: IPSEC, IKMP

Level: 3

IPV4 is the default for the IPVERSION parameter in the CREATE IPSEC POLICY and CREATE ISAKMP POLICY commands. This default was unnecessarily displayed in the SHOW CONFIGURATION DYNAMIC command output. This issue has been resolved.

PCR: 03395

Module: BGP

Level: 3

The amount of time that BGP peers ‘back off’ for after changing from the ESTABLISHED state to the IDLE state has been changed. Previously, this ‘back off‘ time grew exponentially and never decayed. The ‘back off‘ time is now always one second.

PCR: 03396

Module: ETH

Level: 3

Some memory was lost on the AT-AR022 ETH PIC when hotswapping. This issue has been resolved.

PCR: 03400

Module: SSL

Level: 3

Sometimes SSL did not allow its TCP session to close properly. This happened if the Fin packet was not piggy-backed on a data packet, or if the SSL Handshake was never completed with the far end. This meant that the closing Alert was not sent, so the session could not close. Also, SSL leaked memory when it received invalid SSL records. These issues have been resolved.

Patch 86251-05 for Software Release 2.5.1 C613-10356-00 REV F

Page 3
Image 3
Allied Telesis 86251-05 PCR Module SWI Level, PCR Module Ikmp Level, PCR 03371 Module Dhcp Level, PCR Module Http Level