Allied Telesis Patch 86261-04 Manual do Utilizador Página 14

  • Descarregar
  • Adicionar aos meus manuais
  • Imprimir
  • Página
    / 34
  • Índice
  • MARCADORES
  • Avaliado. / 5. Com base em avaliações de clientes
Vista de página 13
14 SHOW IGMPSNOOPING ROUTERADDRESS Patch Release Note
Patch 86261-07 for Software Release 2.6.1
C613-10388-00 REV G
Static ARP entries sometimes prevented the firewall from working
correctly. This is because when an VLAN interface is added to the firewall,
the CPU takes over the routing from the switch silicon in order to inspect
the packet. Hence all the Layer 3 route entries must be deleted. However,
static ARP Layer 3 entries were not being deleted from the silicon. This issue
has been resolved. When interface is added to the firewall, all hardware
layer 3 routing is now turned off to allow the firewall to inspect packets.
If the number of messages to be stored in the TEMPORARY log output was
changed with the SET LOG OUTPUT MESSAGE command, the SHOW
LOG command output did not return any matching log messages. This
issue has been resolved. Existing messages are now displayed.
A STP topology change incorrectly deleted static ARP entries. This issue has
been resolved.
IP MVR member ports were not timing out. MVR member ports now
timeout in the same way as IP IGMP ports. The timeout values are
configured by IGMP. Also, IGMP interfaces were incorrectly being enabled
and disabled by MVR. This issue has been resolved.
After an AT-8800 series switch was powered down or rebooted, non-auto
negotiating copper GBICs were not handled correctly. This issue has been
resolved.
This PCR enhances the robustness of the 802.1x port authentication
protocol.
If a device had IPSec and firewall enabled, it could not handle long ICMP
packets even when enhanced fragment handling was enabled on the
firewall. If a long packet is passed to the firewall for processing, the firewall
chains the fragmented packets. The firewall can process chained packets,
but IPSec could not process these packets, and dropped them. This was only
an issue for packets between 1723 and 1799 bytes long. This issue has been
resolved. The way IP processes fragmented packets has been changed so
that IPsec no longer drops chained packets.
Addresses learned with static port security were not added to the
configuration when the CREATE CONFIG command was executed. This
issue has been resolved.
The following commands did not require security officer privilege when the
device was in security mode, but this privilege should have been required:
PCR: 31159 Module: FW, VLAN Level: 2
PCR: 31161 Module: LOG Level: 3
PCR: 31162 Module: SWI Level: 2
PCR: 31167 Module: IPG Level: 2
PCR: 31170 Module: SWI Level: 2
PCR: 31171 Module: PORTAUTH, USER,STP Level: 2
PCR: 31174 Module: IPG Level: 2
PCR: 31179 Module: SWI Level: 3
PCR: 31180 Module: USER Level: 2
Vista de página 13
1 2 ... 9 10 11 12 13 14 15 16 17 18 19 ... 33 34

Comentários a estes Manuais

Sem comentários