Patch 86222-25
For Rapier Switches and AR800 Series
Modular Switching Routers
Introduction
This patch release note lists the issues addressed and enhancements made in
patch 86222-25 for Software Release 2.2.2 on existing models of Rapier L3
managed switches and AR800 Series L3 modular switching routers. Patch file
details are listed in Table 1.
Table 1: Patch file details for Patch 86222-25.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
This release note should be read in conjunction with the following documents:
■Release Note: Software Release 2.2.2 for Rapier Switches, AR300 and
AR700 Series Routers, and AR800 Series Modular Switching Routers
(Document Number C613-10313-00 Rev A) available from
■Rapier Switch Documentation Set for Software Release 2.2.1 available on
the Documentation and Tools CD-ROM packaged with your switch, or
from www.alliedtelesyn.co.nz/documentation/documentation.html
■AR800 Series Modular Switching Router Documentation Set for Software
Release 2.2.1 available on the Documentation and Tools CD-ROM
packaged with your switching router, or from www.alliedtelesyn.co.nz/
documentation/documentation.html.
WARNING: Using a patch for a different model or software release may cause
unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a
commitment on the part of Allied Telesyn International. While every effort has
been made to ensure that the information contained within this document and
the features and changes described are accurate, Allied Telesyn International
can not accept any type of liability for errors in, or omissions arising from the
use of this information.
86s-222.rez
15-April-2003
86222-25.paz
443760 bytes
.
.
Simply connecting the world
2Patch Release Note
Some of the issues addressed in this patch include a Level number. This
number reflects the importance of the issue that has been resolved. For details
on level numbers, please contact your authorised distributor or reseller.
Features in 86222-25
Patch 86222-25 includes all issues resolved and enhancements released in
previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 02300Module: FirewallNetwork affecting: No
If the command ADD FIREWALL POLICY RULE SOURCEPORT=ALL was
executed, a value of “65535” was incorrectly displayed for the
SOURCEPORT parameter for that rule in the SHOW FIREWALL POLICY
command. This issue has been resolved.
PCR: 02400Module:
Network affecting: No
CORE,FFS,FILE,INSTALL,SCR
If a problem occurred with NVS, some critical files were lost. As a result, the
equipment was forced to load only boot ROM software at boot time. This
patch combined with the new version of the boot ROM software (pr1-1.2.0
for the AR700 series) resolves this issue.
PCR: 02530Module: FIREWALLNetwork affecting: No
The GBLIP parameter in the ADD FIREWALL POLICY RULE
ACTION=NONAT command is optional. However, if the command was
executed without the GBLIP parameter set, the command erroneously
failed after a CREATE CONFIGURATION command was executed. This
issue has been resolved.
PCR: 03111Module: FIREWALL Level: 1
TCP sessions could fail if the public side of the firewall was using Kerberos
and the private side had a very slow connection to the firewall. This issue
has been resolved.
PCR: 03134Module: TCP Level: 2
When using the SET TELNET LISTENPORT command, a fatal error
sometimes occurred. This issue has been resolved.
PCR: 03135Module: SWI Level: 2
The TYPE parameter in the SET SWITCH L3FILTER command was not
written to the script file correctly if MATCH was set to NONE. This issue
has been resolved.
PCR: 03143Module: VRRP Level:
When the PRIORITY parameter in the SET VRRP command was changed,
it was not set correctly when a link was reset. This issue has been resolved.
PCR: 03145Module: IPG Level: 4
The SET IP ROUTE FILTER command was not processing some parameters.
This issue has been resolved.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-25 For Rapier Switches and AR800 Series Modular Switching Routers3
PCR: 03148Module: IPG Level: 3
If the Gratuitous ARP feature was enabled on an IP interface, and an ARP
packet arrived, (either ARP request, or reply) that had a Target IP address
that was equal to the SenderIP address, then the ARP cache was not
updated with the ARP packet’s source data. This issue has been resolved.
PCR: 03160Module: STP Level: 2
Executing the PURGE STP command caused fatal error. This issue has been
resolved.
PCR: 03171Module: DVMRP, IPG Level: 3
DVMRP was erroneously forwarding packets to a VLAN with a
downstream neighbour. This issue has been resolved.
PCR: 03173Module: CORE, NTP Level: 3
The default NTP polling interval was set to 64 seconds, not the correct
interval of 128 seconds. This issue has been resolved.
PCR: 03174Module: IPG Level: 2
This PCR corrects issues that arose with PCR 02203. When the DNS request
forwarding queue failed to accept a new DNS request message (possibly
due to overloading), an attempt was made to close the UDP sessions for
both the primary and secondary name servers. This caused a restart if either
one of these servers did not exist, or the UDP session had failed to open.
This issue has been resolved.
PCR: 03180Module: IPG Level: 3
If all 32 VLAN interfaces had IP addresses attached, only 31 VLANs could
be multihomed. Now all 32 VLAN interfaces with IP addresses can be
multihomed.
PCR: 03202Module: CORE Level: 3
There are two sources of time kept in the device. The real time clock, and the
milliseconds since midnight (msSinceMidnight). The msSinceMidnight can
reach midnight slightly before the real time clock which means that the
value of the msSince Midnight is larger than the number of milliseconds in
a day. This meant that at midnight, the elapsed time since the time-to-live
value for the Firewall and IP-NAT TCP sessions appeared very large and
Firewall and IP-NAT sessions were prematurely aged out. This issue has
been resolved by pausing the msSince Midnight variable at midnight to
wait for the real time clock to catch up.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
PCR: 03217Module: DVMRP Level: 2
If a DVMRP interface was deleted and then added again, DVMRP routes
associated with this interface were not reactivated. This issue has been
resolved.
PCR: 03218Module: DVMRP Level: 2
Some issues with DVMRP forwarding have been resolved.
PCR: 03236Module: IPG Level: 3
IGMP queries were being sent after IGMP was disabled. This issue has been
resolved.
4Patch Release Note
PCR: 03240Module: OSPF Level: 2
A fatal error occurred when OSPF was under high load. This issue has been
resolved.
PCR: 03253Module: FIREWALL Level: 2
Inbound TCP sessions through the firewall (e.g. Telnet and FTP) failed when
the PORT parameter was set to ALL in the SET FIREWALL POLICY RULE
command. This issue has been resolved.
PCR: 03255Module: FIREWALL Level: 3
The firewall doubled the IPSPOOF event timeout from 2 minutes to 4
minutes. This issue has been resolved.
PCR: 03302Module: SWI Level: 3
Following a period of high traffic load, the CPU utilisation would
occasionally fail to drop below 40%. This issue has been resolved.
PCR: 03314Module: SWI Level: 2
Layer 3 filters that matched TCP or UDP port numbers were being applied
to the second and subsequent fragments of large fragmented packets. This
issue has been resolved.
PCR: 03332Module: TTY Level: 2
A log message is now created when a user is forced to logout from an
asynchronous port when another user (i.e. someone connected via Telnet)
resets the asynchronous connection with the RESET ASYN command.
PCR: 03346Module: SNMP Level: 4
Sometimes the Agent Address field in SNMP traps was not the same as the
IP source address. This meant that sometimes the NMS did not send an
alarm to the network manager when traps were received from switches.
This issue has been resolved.
PCR: 03368Module: SWI Level: 2
Layer 2 packets transmitted out of the mirror port were being tagged
erroneously. This issue has been resolved.
PCR: 03378Module: DHCP Level: 2
DHCP sometimes suffered a fatal error when a range of IP addresses was
destroyed. This issue has been resolved.
PCR: 03385Module: FILE, INSTALL, SCR Level:
Critical files (prefer.ins, config.ins and enabled.sec) are now copied from NVS
to FLASH at boot time if they do not exist in FLASH, or if the NVS version
of the file is different from the FLASH version.
PCR: 03386Module: SWI Level: 2
If the SET SWITCH L3FILTER MATCH command had nothing specified for
the IMPORT and EMPORT parameters, and there was an existing match
entry in the filter table, the new filter was not added correctly. Filter match
entries are now accepted regardless of the order in which they are entered
into the table.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-25 For Rapier Switches and AR800 Series Modular Switching Routers5
PCR: 03388Module: DHCP Level: 3
The DHCP lease Expiry time showed incorrectly in the SHOW DHCP
CLIENT command when the lease straddled across multiple months and
years. This issue has been resolved.
PCR: 03402Module: IPG Level:
IP routes deleted from the route cache occasionally caused a fatal error. This
issue has been resolved.
Features in 86222-24
Patch file details are listed in Table 2:
Table 2: Patch file details for Patch 86222-24.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
6-Mar-2003
86222-24.paz
433360 bytes
Patch 86222-23 includes all issues resolved and enhancements released in
previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 02071Module: NTPNetwork affecting: No
When a NTP packet was received from an NTP server (mode 4) the router
acted as a client, and sent a reply back to the server, but did not remove the
peer association. This meant that the Dynamic Peers list, viewed using the
SHOW NTP command, displayed incorrect dynamic peer associations. This
issue has been resolved.
PCR: 02202Module: FIREWALL/IP NATNetwork affecting: No
Previously, when Firewall or IP NAT was enabled, any fragmented IP
packets had to be reassembled so they could be processed. If the fragments
could not be reassembled, the packet was dropped. Reassembly could only
occur if the combined packet (IP header, and protocol header, and data) was
no more than 1800 bytes. An additional limit of no more than eight
fragments was also imposed. This PCR implements enhanced fragment
handling for Firewall and IP NAT. Each module can now be configured to
process fragmented packets of specified protocol types without needing to
reassemble the packet. The number of fragments a packet may consist of is
also configurable. This enhanced fragment handling is disabled by default.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
To enable enhanced fragmentation for Firewall, use the command:
ENABLE FIREWALL POLICY=policy_name
FRAGMENT={ICMP|UDP|OTHER}
To enable enhanced fragmentation for IP NAT, use the command:
ENABLE IP NAT FRAGMENT={ICMP|UDP|OTHER}
To disable enhanced fragmentation for Firewall, use the command:
DISABLE FIREWALL POLICY=policy_name
FRAGMENT={ICMP|UDP|OTHER}
6Patch Release Note
To disable enhanced fragmentation for IP NAT, use the command
DISABLE IP NAT FRAGMENT={ICMP|UDP|OTHER}
To configure the number of fragments permitted per packet for Firewall, use
the command:
SET FIREWALL FRAGMENT=8...50
To configure the number of fragments permitted per packet for IP NAT, use
the command:
SET IP NAT FRAGMENT=8...50
TCP has been excluded from this enhancement because TCP has the MSS
(Maximum Segment Size) parameter for segment size control. Also, for
PPPoE interfaces with a reduced MTU of 1492, a previous enhancement in
PCR 02097 ensures that TCP MSS values in sessions carried by a PPPoE
interface are clamped to a value that prevents fragmentation.
PCR 02116Module: IPG PINGNetwork affecting: No
When pinging to a remote IP address with two or more different cost routes,
if the preferred route became unavailable, the ping failed to switch to the
less preferred route until the ping was stopped and restarted. This issue has
been resolved.
PCR: 02371Module: FIREWALLNetwork affecting: No
When the system time was set to a time that was before or significantly after
the current time, Firewall sessions were prematurely deleted. This issue has
been resolved.
PCR: 03011Module: OSPFNetwork affecting: No
When the router priority was changed on a dynamic OSPF interface, the
new priority did not appear in the output of the SHOW OSPF NEIGHBOUR
command on neighbouring routers. The new priority only showed after the
RESET OSPF command was executed on the neighbouring routers. This
issue has been resolved.
PCR: 03026Module: IPGNetwork affecting: No
After setting the IGMP query timer with the SET IP IGMP command, and
saving the configuration, the IGMP Other Querier timeout was not set to the
correct value after a restart. This issue has been resolved.
PCR: 03027Module: DHCPNetwork affecting: No
Entries in the process of being reclaimed as static entries (and waiting for
the remote IP to become routable), were disrupting the reclaim process. This
prevented further entries from being reclaimed. DHCP static entries are
now fully subject to normal reclaim processing.
PCR: 03032Module: SWINetwork affecting: No
If the ENABLE IP IGMP command was executed before the ENABLE
SWITCH L3FILTER command, Layer 3 filtering did not discard packets
destined for the CPU. This issue has been resolved.
PCR: 03035Module: OSPFNetwork affecting: No
Link state advertisements could incorrectly show an area as a stub area. This
happened during the time when a Direct Route (DR) was removed from a
configuration and before a Direct Backup Route (BDR), or an Other Direct
Route (Other DR) was elected. This issue has been resolved.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-25 For Rapier Switches and AR800 Series Modular Switching Routers7
PCR: 03040Module: IPGNetwork affecting: No
Sometimes IP flows were not deleted correctly when both directions of the
flow were in use. This issue has been resolved.
PCR: 03065Module: SWI Level: 2
When the TX cable was unplugged from a fibre port the operating status
was incorrectly reported as UP. This issue has been resolved.
PCR: 03067Module: DHCP Level: 1
When replying to a DHCP REQUEST that had passed through a DHCP
relay, the broadcast bit of DHCP NAK messages was not being set. This
issue has been resolved in accordance with RFC2131.
PCR: 03080Module: DVMRP
DVMRP was not updating the downstream forwarding state correctly. This
issue has been resolved.
PCR: 03095Module: DHCP Level: 2
DHCP policies are no longer stored in alphabetical order in the DYNAMIC
CONFIGURATION script because this did not work when the DHCP
INHERIT parameter was used.
PCR: 03122Module: SWI Level: 2
When a static ARP was added to a trunk group, a software restart could
occur. This issue has been resolved.
Features in 86222-23
Patch file details are listed in Table 3.
Table 3: Patch file details for Patch 86222-23.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
16-Jan-2003
86222-23.paz
947772 bytes
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-23 includes all issues resolved and enhancements released in
previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 02166Module: FIREWALLNetwork affecting: No
Locally generated ICMP packets, such as unreachable messages, were not
passed out through public interfaces when the packet that caused the
message was not recorded by the firewall. This may occur, for example, if
the packet passed between two public interfaces. This issue has been
resolved.
PCR: 02491Module: IPGNetwork affecting: No
The ARP cache is now updated when a gratuitous ARP request or reply
packet is received.
8Patch Release Note
PCR: 02574Module: DVMRPNetwork affecting: No
Some change actions, and the resending of prune messages were not
operating correctly. This issue has been resolved.
PCR: 02586Module: CORE, FFS, FILE,
Network affecting: No
INSTALL, SCR
Reverses PCR 02400.
PCR: 02587Module: OSPFNetwork affecting: No
When OSPF was enabled on startup, an OSPF interface would sometimes
stay in the DOWN state. This issue has been resolved.
PCR: 03012Module: TTYNetwork affecting: No
Logging out from a Telnet session caused the switch to restart. This issue
has been resolved.
Features in 86222-22
Patch file details are listed in Table 4.
Table 4: Patch file details for Patch 86222-22.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
12-Dec-2002
86222-22.paz
957598 bytes
PCR 02136 Module: FIREWALLNetwork affecting: No
The firewall was blocking outbound ICMP packets when the associated
private interface had a ‘deny all’ rule. The passing of ICMP packets should
be controlled by the ICMP_FORWARDING and PING parameters. This
issue has been resolved.
PCR 02184Module: FFS FILE TTYNetwork affecting: No
This patch supersedes PCRs 02073, 02081, 02086 and 02105. In addition to
enhancements in the preceding PCRs, this PCR now also resolves the
following issues:
•If a compaction was started within 60ms of a file write commencing, the
file being written was placed in the wrong location in the file system.
This led to file corruption during subsequent compactions.
•If a file load occurred during compaction, an incomplete copy of the file
was loaded. The load also put the file into the wrong part of the file
system once the compaction had moved beyond the part of the file that
had been loaded.
•A fatal error occurred during compaction if a file was marked as deleted
when it was being transferred.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-25 For Rapier Switches and AR800 Series Modular Switching Routers9
•Sometimes during compaction when the file system was erasing blocks
belonging to deleted files, one of the files was transferred rather than
deleted. However, its directory entry was deleted, so the file was not
visible with a SHOW FILE command but was visible with a SHOW
FFILE command.
•During compaction if the amount of free space was less than two erase
blocks (including the "spare" erase block), the file system erroneously
reported that a large amount of space was available for a new file due
to an underflow problem. When a new file was written it would corrupt
existing data.
•If the file system was completely full and the deletion of a single file led
to a compaction, the file system reported that it was continually
compacting. This was because it was repeatedly searching through a
linked list of file headers.
•A byte of data from FLASH was incorrectly returning the value 0xFF.
•When a file was renamed using upper case letters, the renamed file did
not appear in the file directory but did appear in FLASH. Also, if a
SHOW FFILE CHECK command was executed after renaming the file,
the file system would appear to hang. All file names must now be lower
case.
•Multiple TTY sessions could edit the same file. This caused
unpredictable behaviour when the TTY sessions closed the files.
A new command, SHOW FFILE VERIFY, has been added. This command
steps through the file system headers starting with file zero and finishing at
the end of the last reachable file. It then verifies that all FLASH locations
from the end of the last reachable file to the beginning of file zero are in an
erased state. Errors are reported as they are found.
PCR 02192Module: IPNetwork affecting: No
The source IP address in DVMRP prune and graft messages was incorrect.
This issue has been resolved.
PCR: 02241Module: FIREWALLNetwork affecting: No
Firewall subnet NAT rules were not working correctly from the private to
the public side of the firewall. Traffic from the public to private side
(destined for subnet NAT) was discarded. These issues have been resolved.
ICMP traffic no longer causes a RADIUS lookup for access authentication,
but is now checked by ICMP handlers for attacks and eligibility. If the ICMP
traffic matches a NAT rule, NAT will occur on inbound and outbound
traffic. HTTP 1.0 requests sometimes caused the firewall HTTP proxy to
close prematurely. Cached TCP sessions were sometimes not hit correctly.
These issues have been resolved.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
PCR: 02359Module: IPGNetwork affecting: No
When an IP Multihomed interface was used as an OSPF interface,
neighbour relationships were only established if the IP interface for OSPF
was added first in the configuration. Now, OSPF establishes neighbour
relationships regardless of the IP Multihomed interface configuration order.
PCR: 02395Module: VRRP, TRGNetwork affecting: No
The SHOW VRRP command now shows the number of trigger activations
for the Upmaster and Downmaster triggers.
10Patch Release Note
PCR: 02396Module: DHCPNetwork affecting: No
DHCP RENEW request messages are now unicast (as defined in the RFC),
not broadcast.
PCR 02400Module: CORE, FFS, FILE,
Network affecting: No
INSTALL, SCR
If a problem occurred with NVS, some critical files were lost. As a result, the
equipment was forced to load only boot ROM software at boot time. This
patch combined with the new version of the boot ROM software (pr1-1.2.0
for the AR700 series) resolves this issue.
PCR 02408Module: SWINetwork affecting: No
The EPORT parameter in the SHOW SWITCH L3FILTER ENTRY command
was displaying incorrectly after an issue was resolved in PCR02374. The
command now displays correctly.
PCR: 02427Module: DHCPNetwork affecting: No
DHCP entry reclaim checks are now delayed by 10 seconds if the entry is
unroutable because the interface is not up.
PCR: 02463Module: DVMRP, IPGNetwork affecting: No
Support for multi-homed interfaces has been added.
PCR 02465Module: TTYNetwork affecting: No
Under some circumstances a fatal error occurred if a large amount of data
was pasted onto the command line. This issue has been resolved.
PCR: 02489Module: SWINetwork affecting: No
When the switch was under heavy learning load, some MAC address were
lost. This issue has been resolved.
PCR 02506Module: OSPF, IPGNetwork affecting: No
In the ADD IP ROUTE FILTER command, when the optional parameter
INTERFACE was included, the filter was not applied to the flooding of
OSPF external LSAs. Also, in the command SHOW IP ROUTE FILTER, the
output of the interface name was truncated when the name was more than
six characters long. These issues have been resolved.
PCR: 02509Module: DVMRPNetwork affecting: No
The source net mask has been removed from DVMRP prune, graft and
graft-ack messages.
PCR 02526Module: DVMRPNetwork affecting: No
Under some circumstances, multiple default routes were created for
DVMRP. This issue has been resolved.
PCR 02538Module: DVMRPNetwork affecting: No
The source mask is now always 0xffffffff in the DVMRP forwarding table.
The temporary route in the DVMRP route table was not displaying
correctly. This issue has been resolved.
An IGMP entry was erroneously added for the reserved IP address. This
issue has been resolved.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Patch 86222-25 For Rapier Switches and AR800 Series Modular Switching Routers11
Features in 86222-21
Patch file details are listed in Table 5:
Table 5: Patch file details for Patch 86222-21.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-222.rez
03-Oct-2002
86222-21.paz
408864 bytes
Patch 86222-21 includes all issues resolved and enhancements released in
previous patches for Software Release 2.2.2, and the following enhancements:
PCR: 02167Module: FIREWALLNetwork affecting: No
Locally generated ICMP messages, that were passed out through a firewall
interface because they were associated with another packet flow, had their
source address changed to that of the associated packet flow and were also
forwarded with incorrect IP checksums. This only occurred when there was
no NAT associated with the packet flow. This issue has been resolved.
PCR: 02236Module: FIREWALLNetwork affecting: No
Sometimes the retransmission of an FTP packet was not permitted through
the Firewall. This issue has been resolved.
PCR: 02245Module: VRRPNetwork affecting: No
VRRP returned an incorrect MAC address for an ARP request. This issue
has been resolved.
PCR: 02327Module: IPG/FIREWALLNetwork affecting: No
In some situations, multihomed interfaces caused the Firewall to apply
NAT and rules incorrectly when packets were received from a subnet that
was not attached to the receiving interface. This issue has been resolved.
PCR: 02329Module: DHCPNetwork affecting: No
An ARP entry for a host has been removed whenever a DHCP DISCOVER
or DHCP REQUEST message is received from the host. This allows for
clients changing ports on a switch.
PCR: 02332Module: IPSECNetwork affecting: No
The sequence number extracted from the AH and ESP header was in the
wrong endian mode, which caused an FTP error with IPSEC anti-replay.
This issue has been resolved.
PCR: 02343Module: PPPNetwork affecting: No
When acting as a PPPoE Access Concentrator (AC), if a PPPoE client sent
discovery packets without the "host-unique" tag, the discovery packets sent
by the AC were corrupted. This issue has been resolved.
Patch 86222-25 for Software Release 2.2.2
C613-10319-00 REV X
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.