Allied Telesis 86222-27 User Manual
Size:
265 Kb
Download

Patch Release Note

Patch 86222-27

For Rapier Switches

Introduction

This patch release note lists the issues addressed and enhancements made in patch 86222-27for Software Release 2.2.2 on existing models of Rapier L3 managed switches. Patch file details are listed inTable 1.

Table 1: Patch file details for Patch 86222-27.

Base Software Release File

86s-222.rez

 

 

Patch Release Date

13-June-2003

 

 

Compressed Patch File Name

86222-27.paz

 

 

Compressed Patch File Size

1036828 bytes

 

 

This release note should be read in conjunction with the following documents:

Release Note: Software Release 2.2.2 for Rapier Switches, AR300 and AR700 Series Routers, and AR800 Series Modular Switching Routers (Document Number C613-10313-00Rev A) available fromwww.alliedtelesyn.co.nz/documentation/documentation.html.

Rapier Switch Documentation Set for Software Release 2.2.1 available on the Documentation and Tools CD-ROMpackaged with your switch, or fromwww.alliedtelesyn.co.nz/documentation/documentation.html.

WARNING: Using a patch for a different model or software release may cause unpredictable results, including disruption to the network. Information in this release note is subject to change without notice and does not represent a commitment on the part of Allied Telesyn International. While every effort has been made to ensure that the information contained within this document and the features and changes described are accurate, Allied Telesyn International can not accept any type of liability for errors in, or omissions arising from the use of this information.

Simply connecting the world

2

Patch Release Note

Some of the issues addressed in this Release Note include a level number. This number reflects the importance of the issue that has been resolved. The levels are:

Level 1 This issue will cause significant interruption to network services, and there is nowork-around.

Level 2 This issue will cause interruption to network service, however there is awork-around.

Level 3 This issue will seldom appear, and will cause minor inconvenience.

Level 4 This issue represents a cosmetic change and does not affect network operation.

Features in 86222-27

Patch 86222-27includes all issues resolved and enhancements released in previous patches for Software Release 2.2.2, and the following enhancements:

PCR: 03501

Module: IPG

Level: 1

A fatal error occurred when DNS relay received a query if the transaction

ID was zero. This issue has been resolved.

PCR: 03616

Module: IPG

Level: 4

Three new commands have been added to enable and disable transmission of the following ICMP messages: Network Unreachable,Host Unreachable, and allRedirect messages.

The commands are:

DISABLE IP

ICMPREPLY[={ALL|NETUNREACH|HOSTUNREACH|REDIRECT}]

ENABLE IP

ICMPREPLY[={ALL|NETUNREACH|HOSTUNREACH|REDIRECT}]

SHOW IP ICMPREPLY

For details, see Enable and Disable ICMP Messages” on page 40.

PCR: 03579

Module: IPG

Level: 1

When IGMP memberships were created at layer 3 from multicast data, sending an IGMP Membership Leave message incorrectly removed all ports from the specified group. This issue has been resolved.

PCR: 03615 Module: LOAD

Level: 3

Zmodem uploads to some terminal emulators did not succeed because the 16-bitchecksum was incorrect. This issue has been resolved.

PCR: 03625

Module: STP, SWI

Level: 4

The MIB object dot1dStpTimeSinceTopologyChange has been implemented to record when a topology change is detected by the bridge.

Patch 86222-27for Software Release 2.2.2C613-10319-00REV Z

Patch 86222-27For Rapier Switches

3

Features in 86222-26

Patch file details are listed in Table 2:

Table 2: Patch file details for Patch 86222-26.

Base Software Release File

86s-222.rez

 

 

Patch Release Date

30-May-2003

 

 

Compressed Patch File Name

86222-26.paz

 

 

Compressed Patch File Size

1028794 bytes

 

 

Patch 86222-26includes all issues resolved and enhancements released in previous patches for Software Release 2.2.2, and the following enhancements:

PCR: 02498 Module: VLAN

Network affecting: No

The correct protocol number is now returned by VLAN Relay.

PCR: 03172

Module: FIREWALL

Level: 3

Telnet access from a public interface to another public interface was not denied. This issue has been resolved.

PCR: 03241

Module: FIREWALL

Level: 2

When deleting a list associated with a policy, all rules were being deleted.

Now only the rules associated with the policy and list are deleted.

PCR: 03412

Module: FIREWALL

Level: 3

FTP data transfers did not succeed for some types of NAT. Also, the presence of flow control TCP flags meant that some TCP control packets were not recognised. These issues have been resolved.

PCR: 03415

Module: FIREWALL

Level: 2

When using a policy routing rule, the firewall did not translate the source

IP address of a broadcast packet correctly. This issue has been resolved.

PCR: 03416

Module: SWI

Level: 3

Previously, the ADD SWITCH L3FILTER MATCH command was accepted if the TYPE parameter was not specified. This command now requires the TYPE parameter, and an error message will be returned if the TYPE parameter is not specified.

PCR: 03420

Module: IPG, SWI

Level: 3

It is now possible to prevent specified ports from acting as IGMP all-groupports, and specify which ports are allowed to behave asall-groupentry ports. This is enabled with the ENABLE IP IGMP ALLGROUP command, and disabled with the DISABLE IP IGMP ALLGROUP command.

For details, see “IGMP Snooping All-Group Entry” on page 42.

Patch 86222-27for Software Release 2.2.2C613-10319-00REV Z

4

Patch Release Note

PCR: 03438 Module: DHCP

Level: 3

A warning message will now appear if the DESTROY DHCP POLICY command is executed for a DHCP policy that has been used by one or more policies as the source of their configuration information. A parent policy can be destroyed with no affect on its child policies.

The new message is:

The destroyed policy <policy-name>has been used by another policy as a source of configuration information.

PCR: 03446

Module: SWI

Level: 3

After unplugging a fibre uplink cable and then plugging it back in, a short

Ping timeout occurred. This issue has been resolved.

PCR: 03457

Module: OSPF

Level: 2

Disabling OSPF caused a fatal error if there was a large routing table. This issue has been resolved.

PCR: 03458

Module: IPG

Level: 3

The route information for ipRouteEntry ofipGroup in theMIB-IIMIB was not correct. This issue has been resolved.

PCR: 03465 Module: DHCP

Level: 2

The IPMTU parameter in the ADD DHCP POLICY command was accepting values in the range 0-4294967295.This parameter now accepts values in the correct range of579-65535.

PCR: 03475

Module: NTP

Level: 3

The PURGE NTP command did not change the UTC offset to the initialised value. This issue has been resolved.

PCR: 03482

Module: SWI

Level: 3

When a Rapier using switch silicon received a multicast packet, the ifOutError port counter was erroneously incremented. This issue has been resolved.

PCR: 03484

Module: FIREWALL

Level: 3

The firewall was not denying an ICMP packet, even if ICMP Forwarding was disabled when using Standard NAT. This issue has been resolved.

PCR: 03496

Module: IPG

Level: 2

Sometimes CPU utilisation reached its maximum limit when an IGMP

Membership Report was received. This issue has been resolved.

PCR: 03499

Module: IPG

Level: 2

The SET TIME command caused an error on Refresh timers for IGMP groups. This issue has been resolved.

PCR: 03506 Module: DHCP

Level: 2

When receiving a request from a client in the Renewing state, the DHCP server incorrectly added an ARP entry for that client’s IP address. Also, the DHCP server allocated an entry while the entry was being reclaimed, and this interrupted the reclaim process. These issues have been resolved.

Patch 86222-27for Software Release 2.2.2C613-10319-00REV Z