Juniper Networks 5200, 208, 204, 500, 5XT, 5400 manual

Models: 500 208 5XT 5200 204 5400

1 42
Download 42 pages 59.79 Kb
Page 6
Image 6
•03537 – The device failed when it incorrectly sent the DHCPDISCOVER packet out in the callback function.

Juniper Networks

NetScreen Release Notes

 

 

03537 – The device failed when it incorrectly sent the DHCPDISCOVER packet out in the callback function.

03528 – The subscription key retrieval operation worked only intermittently because the device did not close the SSL socket properly.

03522 – When Security Manager imported a Juniper NetScreen-5200 with a configuration with large amounts of policies (5,000) and VPNs (2,000), the device failed.

03495 – You could not retrieve mail from certain mail clients that send POP3 authentication requests (such as Mozilla Mail Client) because the device did not support POP3 authentication.

03478 – A few days after you first configured the Juniper NetScreen-5GT, the device could receive traffic, but not transmit it.

03463 – When ScreenOS performed an SNMP traversal over the MIB for the Juniper NetScreen-5200, the traversal halted because the device OID did not increment properly.

03435 – The Simple Mail Transfer Protocol (SMTP) client timed out when large attachments passed through a Juniper NetScreen-5GT anti-virus scan.

03433 – When two BGP peers established an adjacency and then lost the adjacency state, and the NetScreen peer attempted to reestablish the state, the NetScreen peer could be in the wrong state. This prevented it from reestablishing the adjacency.

03415 – You could not re-add a peer to a BGP peer group once you unset it.

03413 – A firewall device could fail when multiple users attempted unauthorized SSH sessions.

03404 – The device generated incorrect traffic log titles when it sent a traffic log based on a multicell policy. The traffic log title displayed the same source IP and destination IP addresses.

03397 – The device failed because VPN traffic did not handle interrupts properly.

03394 – You could not manage the untrust interface through a route-based VPN.

03379 – After successfully configuring the Juniper NetScreen-5GT in Extended mode, the WebUI incorrectly indicated that the device was in Trust-Untrust mode.

03369 – When the primary device in an HA pair performed a cold start synchronization, with a large number of VPN tunnels, the backup device in the HA pair sometimes dropped some SPI synchronization packets.

03367 – When you clicked the Cancel button on the WebUI admin page for Security Manager, you could no longer locate the page.

ScreenOS 5.0.0r9-FIPS

P/N 093-1638-000, Rev. A

Page 6 of 42

Page 6
Image 6
Juniper Networks 5200, 208 The device failed when it incorrectly sent the DHCPDISCOVER packet out in the callback function