Allied Telesis 86241-02 Nota de lançamento - Página 2

Procurar online ou descarregar pdf Nota de lançamento para Software Allied Telesis 86241-02. Allied Telesis 86241-02 12 páginas. Patch for rapier switches and ar800 series modular switching routers

2
Features in 86241-02
Patch 86241-02 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR: 02103
Module: SWI
IPX traffic passing between two switch instances using VLAN for Rapier48
now operates correctly.
PCR: 02210
Module: DNS Relay
Buffer leaks occurred when DNS relay was enabled. This issue has been
resolved.
PCR: 02214
Module: IPG
A buffer leak occurred when a large number of flows (over 4000) were in use
and needed to be recycled. This issue has been resolved.
PCR: 02220
Module: SWI
The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET
SWITCH L3FILTER ENTRY commands was matching multicast and
broadcast packets with software filtering. This issue has been resolved.
PCR: 02236
Module: FIREWALL
Sometimes the retransmission of an FTP packet was not permitted through
the Firewall. This issue has been resolved.
PCR: 02245
Module: VRRP
VRRP returned an incorrect MAC address for an ARP request. This issue
has been resolved.
PCR: 02263
Module: VRRP
The virtual MAC address was used as the source MAC for all packets
forwarded on an interface associated with a Virtual Router (VR). This was
confusing when multiple VRs were defined over the same interface because
only one virtual MAC address was ever used. The other virtual MAC
addresses (for the other VR's) were only used if the source IP address
matched the VR's IP address. To avoid this confusion, the system MAC
address is now always used unless the source IP address of the packet is the
same as the VR's IP address.
PCR: 02267
Module: BGP
When route aggregation was enabled, the atomic aggregate was not being
set. This issue has been resolved.
PCR: 02268
Module: FIREWALL
HTTP requests from a fixed IP address were erroneously reported as a host
scan attack in the Firewall deny queue. This issue has been resolved.
Patch Release Note
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Network affecting: No
Patch 86241-02 for Software Release 2.4.1
C613-10340-00 REV B