Allied Telesis 86253-07 User Manual

Page 21

Advertising
background image

Patch 86253-07 For Rapier Series Switches

SHOW IGMPSNOOPING ROUTERADDRESS

21

Patch 86253-07 for Software Release 2.5.3
C613-10382-00 REV E

The switch was adding a router port for multicast packets to destinations
with an address in the range 224.0.0.x. Switch port entries are now only
created for special router multicast addresses.

If the DHCP server had a policy name greater than 5 characters long, and a
very long MERITDUMP or ROOTPATH value, the device could not
correctly create the configuration. This issue has been resolved.

A fatal error occurred when a long string of text was pasted over an existing
long string of text at the CLI. This issue has been resolved.

An ETH interface was sometimes shown as Up in the output of the SHOW
INTERFACE command when it was actually Down. This issue has been
resolved.

Under some circumstances traffic did not have NAT applied if a standard
subnet NAT rule was added to a public interface. Such rules did not
correctly match incoming traffic when the REMOTEIP parameter in the
ADD FIREWALL POLICY RULE command was not specified, and the
destination IP address was not the interface’s actual IP address. If this
situation occurred, traffic was redirected back out the public interface. This
issue has been resolved.

Software emulation of layer 3 hardware filtering was not operating
correctly. Packets that the switch had no routing information for were
filtered incorrectly. The first packet of a flow that should have been dropped
was not dropped, and a flow that should have been allowed was being
dropped. This issue has been resolved.

The CREATE CONFIG command did not generate the TYPE parameter for
ADD IPV6 INTERFACE commands. This issue has been resolved.

The ADD SWITCH FILTER command returned an incorrect error message
if a broadcast address was specified for the DESTINATION parameter. This
issue has been resolved.

When IGMP snooping was disabled with the DISABLE IGMPSNOOPING
command, IGMP packets were not flooded. This issue has been resolved.

ARP requests with invalid source MAC and IP addresses were being
processed, but should have been dropped. This issue has been resolved.

PCR: 03890

Module: IGMP, SWI

Level: 2

PCR: 03895

Module: DHCP

Level: 2

PCR: 03896

Module: TTY

Level: 3

PCR: 03898

Module: ETH

Level: 3

PCR: 03902

Module: FIREWALL

Level: 3

PCR: 03906

Module: SWITCH

Level: 2

PCR: 03907

Module: IPV6

Level: 2

PCR: 03911

Module: SWI

Level: 3

PCR: 03914

Module: IPG, VLAN

Level: 3

PCR: 03921

Module: IP ARP

Level: 3

Advertising