Anleitung Allied Telesis, modell 86241-01
Hersteller: Allied Telesis Dateigröße: 45.24 kb Dateiname: 2c874015-70c2-e654-4d85-a5e837cb6f15.pdf
Unterrichtssprache:
|
|
|
|
Link zum kostenlosen Download Hinweise finden Sie am Ende der Seite
Anleitung Zusammenfassung
Patch file details are listed in Table 1. Table 1: Patch file details for Patch 86241-01. Base Software Release File 86s-241.rez Patch Release Date 26-July-2002 Compressed Patch File Name 86241-01.paz Compressed Patch File Size 27732 bytes This release note should be read in conjunction with the following documents: ¦ Release Note: Software Release 2.4.1 for Rapier Switches, AR300 and AR700 Series Routers, and AR800 Series Modular Switching Routers (Document Number C613-10338-00 Rev A) available from ¦ Rapier Switch Documentation Set for Software Release 2.4.1 available on the Documentation and Tools CD-ROM packaged with your switch, or from WARNING: Using a patch for a different model or software release may cause unpredictable results, including disruption to the network. Information in this release note is subject to change without notice and does not represent a commitment on the part of Allied Telesyn International. While every effort has been made to ensure that the information contained within this document and the features and changes described are accurate, Allied Telesyn International can not accept any type of liability for errors in, or omissions arising from the use of this information. Simply connecting the world Patch Release Note Features in 86241-01 Patch 86241-01 includes the following enhancements: PCR: 02036 Module: SWITCH Network affecting: No A new command allows the Layer 3 aging timer to be changed: SET SWITCH L3AGEINGTIMER= where seconds can be 30 - 43200. After each cycle of the ageing timer, all existing Layer 3 entries with the hit bit set will have the hit bit reset to zero, and all existing Layer 3 entries with the hit bit set to zero will be deleted. The SHOW SWITCH command output now displays the Layer 3 ageing timer value. PCR 02138 Module: SWI Network affecting: No The built in Self Test Code for all Rapiers, except G6, has been improved to enhance the detection of faults in switch chip external packet memory. PCR: 02158 Module: FIREWALL Network affecting: No When a TCP RST/ACK was received by a firewall interface, the packet that was passed to the other side of the firewall lost the ACK flag, and had an incorrect ACK number. This issue has been resolved. PCR: 02185 Module: VRRP Network affecting: No The SHOW CONFIG DYNAMIC=VRRP command was not showing port monitoring and step values correctly. This issue has been resolved. PCR: 02229 Module: IPG Network affecting: No The PURGE IP command now resets the IP route cache counters to zero. PCR: 02240 Module: SWI Network affecting: No The SENDCOS filter action did not operate correctly across switch instances. This was because the stacklink port on the Rapier 48 did not correctly compensate for the stack tag on frames received via the filter. This issue has been resolved. PCR: 02241 Module: FIREWALL Network affecting: No Firewall subnet NAT rules were not working correctly from the private to the public side of the firewall. Traffic from the public to private side (destined for subnet NAT) was discarded. These issues have been resolved. ICMP traffic no longer causes a RADIUS lookup for access authentication, but is now checked by ICMP handlers for attacks and eligibility. If the ICMP traffic matches a NAT rule, NAT will occur on inbound and outbound traffic. HTTP 1.0 requests sometimes caused the firewall HTTP proxy to close prematurely. Cached TCP sessions were sometimes not hit correctly. These issues have been resolved. PCR: 02242 Module: IPG Network affecting: No On a Rapier 24, adding an IP interface over a FR interface caused an ASSERT debug fatal error. This issue has been resolved. Patch 86231-06 for Software Release 2.3.1 C613-10328-00 REV F Patch 86241-01 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 02250 Module: FIREWALL Network affecting: No Sometimes the Firewall erroneously used NAT. This issue has been resolved. PCR: 02259 Module: DHCP, IPG Network affecting: No A dual Ethernet router was incorrectly accepting an IP address from a DHCP server when the offered address was on the same network as the other Ethernet interface. An error is now recorded when DHCP offers an address that is in the same subnet as another interface. Availability Patches can be downloaded from the Software Updates area of the Allied Telesyn web site at A licence or password is not required to use a patch. Patch 86231-06 for Software Release 2.3.1 C613-10328-00 REV F Patch Release Note Patch 86231-06 for Software Release 2.3.1 C613-10328-00 REV F ...