Juniper Networks 204, 5200, 208, 500, 5XT, 5400 manual A memory corruption caused the device to fail

Models: 500 208 5XT 5200 204 5400

1 42
Download 42 pages 59.79 Kb
Page 8
Image 8
•03250 – A memory corruption caused the device to fail.

Juniper Networks

NetScreen Release Notes

 

 

03269 – The Juniper NetScreen-5GT incorrectly autonegotiated to 10MBps half duplex after it had initially set itself to 10MBps full duplex.

03267 – The anti-virus feature had a problem handling the HTTP packets because a web server inserted too many unnecessary white spaces in the HTTP header.

03263 – When managing the device from the V1-untrust or V1-trust interface using Manage IP, multiple sessions were created for each packet.

03261 – When you have two VPNs active between two devices, with outgoing interfaces, after the VPN Monitor deactivated the tunnel after nine seconds, and caused a failover to the secondary VPN, the device did not update the session information.

03250 – A memory corruption caused the device to fail.

03243 – In an instance where the client on the Untrust side of the device connected to a MIP that connected the server to the trust side, when an ASP began the server, it used a zero-sized window, slowing down performance, with the server sending back one character at a time.

03239 – When you performed an FTP transfer or email download that went beyond the maximum bandwidth allocated in the traffic shaping feature, VOIP calls experienced a lot of intermittent voice transmissions.

03235 – When you forcefully closed several PKA/RSA SSH sessions without properly logging out first, the system randomly failed several times.

03232 – Under some conditions, an HA (High Availability) pair with a 5000- M2 module installed failed. This occurred when the primary device had 4,000 sessions on it and the backup device had 100,000 sessions.

03205 – When running two Juniper NetScreen-5200-24FE systems in an HA active-passive environment, the secondary path would fail and both devices would assume the primary role after you unplugged the two HA links.

03203 – The device sometimes failed when it traversed the session table.

03178 – The device sometimes failed with high CPU and the full session table due to session memory corruption.

03177 – Intermittent system failures occurred during an SNMP walk.

03152 – When running XAuth in the WebUI environment, the XAuth page displays the CHAP fragment reassembly method selected by default.

03142 – When you sent 64 bytes of packets through a route-based VPN between two Juniper NetScreen-5200 Series systems with an IXIA packet analyzer device, the Security Association failed and the packets did not pass through the IXIA device.

03136 – Gratuitous ARP packets sent out to broadcast the presence of a device were blocked from being sent.

ScreenOS 5.0.0r9-FIPS

P/N 093-1638-000, Rev. A

Page 8 of 42

Page 8
Image 8
Juniper Networks 204, 5200, 208, 500, 5XT, 5400 manual A memory corruption caused the device to fail