Allied Telesis 86251-05 User Manual

Page 3

Advertising
background image

Patch 86251-05 For Rapier Switches and AR800 Series Modular Switching Routers

3

Patch 86251-05 for Software Release 2.5.1
C613-10356-00 REV F

The inter-packet gap has been reduced by 4 bytes on the Rapier 48i stacking
link. This allows for non-blocking operation with tagged packets.

Under some circumstances, ISAKMP suffered a fatal error if more than 8 SA
proposals were presented. This issue has been resolved.

Layer 3 filters that matched TCP or UDP port numbers were being applied
to the second and subsequent fragments of large fragmented packets. This
issue has been resolved.

The SET FIREWALL POLICY RULE command was not accepting the value
24:00 (midnight) for the BEFORE parameter. This issue has been resolved.

A minimum lease time can no longer be specified when creating a DHCP
policy. This complies with RFC 2131.

If there were a large number of routes in the route table, and the SHOW IP
ROUTE command was executed, the device stopped operating. This issue
has been resolved.

Occasionally a fatal error occurred when the GUI browser started or a page
was refreshed. This issue has been resolved.

IPV4 is the default for the IPVERSION parameter in the CREATE IPSEC
POLICY and CREATE ISAKMP POLICY commands. This default was
unnecessarily displayed in the SHOW CONFIGURATION DYNAMIC
command output. This issue has been resolved.

The amount of time that BGP peers ‘back off’ for after changing from the
ESTABLISHED state to the IDLE state has been changed. Previously, this
‘back off‘ time grew exponentially and never decayed. The ‘back off‘ time is
now always one second.

Some memory was lost on the AT-AR022 ETH PIC when hotswapping. This
issue has been resolved.

Sometimes SSL did not allow its TCP session to close properly. This
happened if the Fin packet was not piggy-backed on a data packet, or if the
SSL Handshake was never completed with the far end. This meant that the
closing Alert was not sent, so the session could not close. Also, SSL leaked
memory when it received invalid SSL records. These issues have been
resolved.

PCR: 03270

Module: SWI

Level: 3

PCR: 03299

Module: IKMP

Level: 2

PCR: 03314

Module: SWI

Level: 2

PCR: 03354

Module: FIREWALL

Level: 3

PCR: 03371

Module: DHCP

Level: 3

PCR: 03383

Module: IPG

Level: 2

PCR: 03390

Module: HTTP

Level: 2

PCR: 03392

Module: IPSEC, IKMP

Level: 3

PCR: 03395

Module: BGP

Level: 3

PCR: 03396

Module: ETH

Level: 3

PCR: 03400

Module: SSL

Level: 3

Advertising