![Patch file details for Patch 86222-20 are listed in Table 3:](/images/new-backgrounds/137101/13710111x1.webp)
6 | Patch Release Note |
Features in
Patch file details for Patch 86222-20 are listed in Table 3:
Table 3: Patch file details for Patch
Base Software Release File | |
|
|
Patch Release Date | |
|
|
Compressed Patch File Name | |
|
|
Compressed Patch File Size | 397708 bytes |
|
|
Patch
PCR: 01226 | Module: IGMP | Network affecting: Yes |
The IGMP specific query sent by the router/switch now contains the correct default response time of 1 second. Also, ifOutOctets in the VLAN interface MIB now increments correctly.
PCR: 01270 | Module: APPLE | Network affecting: No |
If a port did not belong to an ethernet interface, or was not directly connected to the seed port it could not receive advertised router numbers. This issue has been resolved.
PCR: 01285 | Module: OSPF | Network affecting: No |
When an interface went down (or was disabled) on an AS border router, the external routes were not removed from the routing domain. Such routes are now removed by premature aging.
PCR: 02024 | Module: IPG | Network affecting: No |
Proxy Arp can now be used on VLAN interfaces.
PCR: 02122 | Module: FIREWALL | Network affecting: No |
A fatal error sometimes occurred if a TCP session originating on the public side of the firewall sent packets before the session was established with the host on the private side of the firewall. This issue has been resolved.
PCR: 02128 | Module: FIREWALL | Network affecting: No |
Some FTP packets handled by the firewall were forwarded with incorrect sequence numbers, causing FTP sessions to fail. This issue has been resolved.
PCR: 02150 | Module: CORE, SNMP | Network affecting: No |
When passing
PCR: 02158 | Module: FIREWALL | Network affecting: No |
When a TCP RST/ACK was received by a firewall interface, the packet that was passed to the other side of the firewall lost the ACK flag, and had an incorrect ACK number. This issue has been resolved.
Patch