Allied Telesis 86222-10 User Manual

Patch Release Note
Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers

Introduction

This patch release note lists the issues addressed and enhancements made in patch 86222-10 for Software Release 2.2.2 on existing models of Rapier L3 managed switches and AR800 Series L3 modular switching routers. Patch file details are listed in Table 1.
Table 1: Patch file details for Patch 86222-10.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
This release note should be read in conjunction with the following documents:
Release Note: Software Release 2.2.2 for Rapier Switches, AR300 and
AR700 Series Routers, and AR800 Series Modular Switching Routers (Document Number C613-10313-00 Rev A) available from
www.alliedtelesyn.co.nz/documentation/documentation.html
Rapier Switch Documentation Set for Software Release 2.2.1 available on
the Documentation and Tools CD-ROM packaged with your switch, or from www.alliedtelesyn.co.nz/documentation/documentation.html
AR800 Series Modular Switching Router Documentation Set for Software
Release 2.2.1 available on the Documentation and Tools CD-ROM packaged with your switching router, or from www.alliedtelesyn.co.nz/
documentation/documentation.html.
WARNING: Using a patch for a different model or software release may cause unpredictable results, including disruption to the network. Information in this release note is subject to change without notice and does not represent a commitment on the part of Allied Telesyn International. While every effort has been made to ensure that the information contained within this document and the features and changes described are accurate, Allied Telesyn International can not accept any type of liability for errors in, or omissions arising from the use of this information.
86s-222.rez
29-Nov-2001
86222-10.paz
295536 bytes
.
.
Simply connecting the world
2 Patch Release Note
PCR: 01264 Module: SWI Network affecting: No
Some switch chip register settings have been optimised to improve the provision of CoS with the newer revision of switching silicon.

Features in 86222-09

Patch file details for Patch 86222-09 are listed in Table 2.
Table 2: Patch file details for Patch 86222-09.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
27-Nov-2001
86222-09.paz
295444 bytes
Patch 86222-09 includes all issues resolved and enhancements released in previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 01189 Module: STP, SWI Network affecting: Yes
A new feature, STP forwarding, has been added. STP forwarding can be enabled and disabled using the commands:
ENABLE SWI STPFORWARD
DISABLE SWI STPFORWARD
When STP forwarding is enabled, all STP forwarding is ignored and all BDPUs received on a port are forwarded on all other ports.
PCR: 01242 Module: CORE, SNMP Network affecting: No
The switch now delays sending link traps immediately after a restart to give the link to the trap host time to come up. A similar change has been made for the cold start trap. After a 10s delay, all interfaces which are UP have a link trap generated for them. After that, link traps are sent as normal.
PCR: 01244 Module: SWI, CORE, IPG Network affecting: No
Processing invalid UDP packets caused a memory leak. This issue has been resolved. Additional debugging facilities were added.
PCR: 01246 Module: SWI Network affecting: No
The default setting for the switch port parameter INFILTERING is now OFF, as specified in IEEE802.1Q. A VLAN will still reject these packets if they are not from valid VLAN member ports.
PCR: 01247 Module: IPG Network affecting: No
The IGMP snooping forwarding process now correctly selects outgoing ports when DVMRP is managing the multicast routing information.
Patch 86222-10 for Software Release 2.2.2
C613-10319-00 REV J
Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers 3
PCR: 01248 Module: SWI Network affecting: No
A configuration problem prevented trunking of gigabit ports at 100Mbit speeds. This issue has been resolved. The A39 gigabit copper uplink reverted to autonegotiation after a restart, even if it was configured to a fixed speed. This issue has been resolved. When the port has been configured for a fixed speed, the mode is now set to MDIX, not MDI.
PCR: 01254 Module: PRI Network affecting: No
When an M2 version of the AR020 PRI E1/T1 PIC was installed in a AR040 NSM it was not possible to select the T1 mode of operation regardless of the jumper setting. This issue has been resolved.
PCR: 01256 Module: Firewall Network affecting: No
A fatal error occurred when the firewall discarded disallowed multicast packets. This issue has been resolved.

Features in 86222-08

Patch file details for Patch 86222-08 are listed in Table 3.
Table 3: Patch file details for Patch 86222-08.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
09-Nov-2001
86222-08.paz
291012 bytes
Patch 86222-08 includes all issues resolved and enhancements released in previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 01201 Module: L2TP Network affecting: Yes
Tunnel creation failed when attempting to establish a point-to-point tunnel from an ATR router (tunnel originator) to another vendor ’s router. This issue has been resolved.
PCR: 01233 Module: PIM Network affecting: No
When IGMP snooping was enabled, if a member left a group on a port, it could not re-join the group on that port. This issue has been resolved.
Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J
Substantial changes have been made to PIM in more recent code releases. These have been retrofitted to 2-2-2 in the patch. Note: these changes have incorporated PCRs 01159 and 01190.
PCR: 01236 Module: PPP Network affecting: No
The PPPoE access concentrator did not stop RADIUS accounting when a PADT termination was received without receiving a proper PPP termination first. This issue has been resolved.
4 Patch Release Note
PCR: 01237 Module: SWI Network affecting: No
The dot1dBridge MIB implementation now complies with RFC1493.

Features in 86222-07

Patch file details for Patch 86222-07 are listed in Table 4:
Table 4: Patch file details for Patch 86222-07
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
26-Oct-2001
86222-07.paz
250468 bytes
Patch 86222-07 includes all issues resolved and enhancements released in previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 01018 Module: DHCP Network affecting: No
DHCP now correctly handles request messages containing request list options not supported by the router.
PCR: 01160 Module: IPG,FIREWALL Network affecting: No
The router would accept TCP sessions with destination address the same as the subnet broadcast address for one of the router’s interfaces. Firewall­generated packets destined for a subnet broadcast address on one of the routers interfaces would cause a fatal error. These issues have been resolved.
PCR: 01168 Module: HTTP Network affecting: No
A watchdog timout occurred when the router received an HTTP message with an over-length header. Normal HTTP requests would also occasionally cause watchdog timeouts. These issues have been resolved.
PCR: 01182 Module: OSPF Network affecting: No
The OSPF route filter was not filtering out external routes. This issue has been resolved.
PCR: 01193 Module: IPG Network affecting: No
MD5 Authentication now works correctly with RIP packets.
PCR: 01194 Module: L2TP, IPG Network affecting: No
The SET IP LOCAL command caused a fatal error if the router was configured with a default route over an L2TP tunnel, because there was no valid route to the remote IP address of the tunnel. This issue has been resolved.
Patch 86222-10 for Software Release 2.2.2
C613-10319-00 REV J
Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers 5
PCR: 01197 Module: Q931 Network affecting: No
Debug messages are no longer generated when a Q.931 Advise of Charge Notification message is received.
PCR: 01198 Module: TCP Network affecting: No
TCP sessions would get stuck in the FINWAIT2 state if the remote host did not send a FIN message when required. The router now starts a timer when a TCP session enters the FINWAIT2 state and will automatically close the session if the timer expires.
PCR: 01199 Module: IPG Network affecting: No
The SET IP FILTER command was not correctly handling the ICMPTYPE and ICMPCODE parameters. This issue has been resolved.
PCR: 01202 Module: DHCP Network affecting: No
The router will now accept DHCP messages that are greater than or equal to 576 bytes in size, and reject any message smaller than 576 bytes. This operation conforms to RFC 1541.
PCR: 01203 Module: ISAKMP Network affecting: No
ISAKMP quick mode exchanges are now committed if any traffic is received over the newly generated SA. This improves stability in very lossy networks where the commit message may get lost.
PCR: 01204 Module: ISAKMP Network affecting: No
ISAKMP debugging caused a fatal error when the debugging mode was set to ALL and PFS was enabled. This issue has been resolved.
PCR: 01205 Module: PPP Network affecting: No
PPPoE interfaces with IDLE set to ON would not retry active discovery when more data was received if active discovery had previously failed. This issue has been resolved.
PCR: 01206 Module: ISAKMP Network affecting: No
A memory loss occurred when certificates were used by ISAKMP. This issue has been resolved.
PCR: 01207 Module: ISAKMP Network affecting: No
ISAKMP heartbeats are no longer transmitted if the lower layer interface is down. This stops ISAKMP heartbeats from bringing up links in dial-up environments.
Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J
PCR: 01209 Module: ISAKMP Network affecting: No
In some conditions it was possible for ISAKMP packets to be lost and not retransmitted. Incoming ISAKMP messages are now validated before stopping retransmission of the previous message.
PCR: 01211 Module: SWI Network affecting: No
The COS_DST bit on ARL for L3 interface should be 0x4 (higher priority) for CPU ports. This has been corrected.
Loading...
+ 9 hidden pages