Juniper Networks | NetScreen Release Notes |
|
|
•01958 – An internal mishandling of the MAC cache could cause a security appliance to crash.
•01944 – The group addresses for
•01812 – Using
5.Known Issues
This section describes known issues with the current release.
•Section 5.1 “Limitations of Features in ScreenOS 5.0.0” identifies features that are not fully functional at the present time, and will be unsupported for this release. Juniper recommends that you do not use these features.
•Section 5.2 “Compatibility Issues in ScreenOS 5.0.0 on page 30” describes known compatibility issues with other products, including but not limited to specific Juniper NetScreen appliances, other versions of ScreenOS, Internet browsers, Juniper management software and other vendor devices. Whenever possible, information is provided for ways to avoid the issue, minimize its impact, or in some manner work around it.
•Section 5.3 “Known Issues in ScreenOS 5.0.0 on page 32” describes deviations from intended product behavior as identified by Juniper Networks Test Technologies through their verification procedures. Again, whenever possible, information is provided to assist the customer in avoiding or otherwise working around the issue.
5.1Limitations of Features in ScreenOS 5.0.0
The following limitations are present in ScreenOS 5.0.0.
•No Support for Packet Attribute Features – The Juniper NetScreen- 5000 Series systems do not support the aggressive aging, maximum fragment size, path MTU (Maximum Transmission Unit), and Interface MTU features.
•Vsys for Group IKE ID – Group IKE ID users cannot be used in a vsys if that vsys uses a shared untrust interface.
W/A: Use a private Untrust interface (tagged VLAN subinterface or dedicated physical interface) for the vsys.
ScreenOS | P/N | Page 29 of 42 |