Juniper Networks 204, 5200, 208, 500, 5XT, 5400 manual

Models: 500 208 5XT 5200 204 5400

1 42
Download 42 pages 59.79 Kb
Page 26
Image 26
discrepancy, you had to read the text description of the trap type to identify it. Now you can refer to the trap type value to identify it. For example, the traditional SNMP trap type value for a Cold Start event is 0. Please check the ScreenOS Messages Guide for the correct values in ScreenOS 5.0.0.

Juniper Networks

NetScreen Release Notes

 

 

discrepancy, you had to read the text description of the trap type to identify it. Now you can refer to the trap type value to identify it. For example, the traditional SNMP trap type value for a Cold Start event is 0. Please check the ScreenOS Messages Guide for the correct values in ScreenOS 5.0.0.

02062 – Under certain circumstances, Track-IP was not sent out and caused the NSRP failover operation to fail.

02059 – When you changed an IKE gateway from Static IP to Dynamic IP using the WebUI, the procedure automatically changed the setting from Main Mode to Aggressive mode.

02057 – Multiple custom addresses or service groups in a policy sometimes caused a Juniper Networks security appliance to fail during restart.

02050 – Configuring an address group from an Apple computer using Internet Explorer sometimes caused a Juniper Networks security appliance to fail.

02047 – When the device received a packet with Ethernet type 0x8888, the device failed.

02045 – Under certain circumstances, the device incorrectly flagged and dropped IP-Spoof packets.

02044 – An operation using SSH version 1 to access the device failed when using Radius for administration authentication.

02035 – The device did not allow URL filtered traffic when the URL queue was full and the URL queue size was too small to process heavy traffic.

02034 – In transparent mode, when selecting the WebAuth option in the WebUI for the V1-Untrust Zone, it appeared to take effect, but when closing the window and then returning to the V1-Untrust configuration window, the WebAuth option was no longer selected.

02019 – You could not use the WebUI to remove the key id and preshared key of the primary NTP server.

02018 – The Juniper Networks security appliance failed when applying debug commands, for example, the set ffilter command.

02001 – If a dynamically added route and a static route on a device both used the same interface default gateway as the next hop, when the dynamic route’s interface default gateway changed, the static route’s gateway did not change with it as expected.

01993 – You could not modify management services on interfaces configured in the WebUI environment to obtain addresses using DHCP.

01986 – In an NSRP environment, the primary device sometimes had more active XAuth users than the backup device because the garbage collection mechanism for IPSec SA removed XAuth users from the backup device at a more accelerated rate than it did from the primary device.

ScreenOS 5.0.0r9-FIPS

P/N 093-1638-000, Rev. A

Page 26 of 42

Page 26
Image 26
Juniper Networks 204, 5200, 208, 500, 5XT, 5400 manual