This patch release note lists the issues addressed and enhancements made in
patch 86241-06 for Software Release 2.4.1 on existing models of Rapier L3
managed switches. Patch file details are listed in Table 1.
Table 1: Patch file details for Patch 86241-06.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
This release note should be read in conjunction with the following documents:
■Release Note: Software Release 2.4.1 for Rapier Switches, (Document
Number C613-10338-00 Rev A) available from www.alliedtelesyn.co.nz/
documentation/documentation.html.
■Rapier Switch Documentation Set for Software Release 2.4.1 available on
the Documentation and Tools CD-ROM packaged with your switch, or
from www.alliedtelesyn.co.nz/documentation/documentation.html
WARNING: Using a patch for a different model or software release may cause
unpredictable results, including disru ption to the network. Info rmation in th is
release note is subject to change without notice and does not represent a
commitment on the part of Allied Telesyn International. While every effort has
been made to ensure that the inf ormati on con tai ned wi thin t his documen t a nd
the features and changes described are accurate, Allied Telesyn International
can not accept any type of liability for errors in, or omissions arising from the
use of this information.
86s-241.rez
28-Feb-2003
86241-06.paz
369480 bytes
.
Simply connecting the world
Some of the issues addressed in this Release Note include a level number. This
number reflects the importance of the the issue that has been resolved. For
details on level numbers, please contact your authorised distributor or reseller.
Page 2
2Patch Release Note
Features in 86241-06
Patch 86241-06 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR: 02429Module: IPG Level: 2
When more than two firewall policies were configured, an unexpected
switch restart sometimes occurred. This issue has been resolved.
PCR: 02562Module: SWI
Dynamic Port Security allows for dynamic MAC address learning on a
switch port. If a MAC address is unused for a period of time, it will be aged
from the database of currently accepted MAC addresses. This allows the
learning of new MAC addresses. Dynamic Port Security is useful because
port security allows the number of devices that are connected to a
particular switch port to be limited.
For more information on Dynamic Port Security, see “Dynamic Port Security” on page 29 of this patch release note.
PCR: 03042Module: PIM Level: 3
PIM join messages were being sent by a switch connected to an upstream
and a downstream switch or router in the same VLAN when a multicast
group had no members. This issue has been resolved.
PCR: 03044Module: BGP Level: 2
The switch did not always advertise its preferred r outes to destinations that
were affected by flapping routes. In these conditio ns, a BGP network does
not run efficiently. This issue has been resolved.
PCR: 03048Module: STP Level: 2
A switch port belonging to an enabled STP instance would not respond to
ARP requests if the port had been disabled from STP operation. This
prevented the flow of some types of traffic into affected switch ports. This
issue has been resolved.
PCR: 03054Module: TTY, TACPLUS
When a connection is made by Telnet, or directly through the ASYN port, a
TTY session is created with:
■ an idle timeout time. The default idle time is zero, which means the TTY
session will not time out if there is a lack of activity . If a TACACS+ server is
configured on the switch, and the idle time attrib ute value pair (AVP) is
configured on the T ACACS+ ser ver and is received by the switch, the value
of the idle time from the TACACS+ server is used to set the TTY session.
■a timeout of zero, which means that the TTY session will not time out. If a
TACACS+ server is configured on the switch, and the timeout attribute
value pair (AVP) is configured on the TACACS+ server and received by the
switch, the value of the timeout from the TACACS+ server is used to set
the TTY session timeout. After the timeout period has elapsed, the user
will either be disconnected by termination of their TTY connection (the
default setting), or have their privilege level reduced to USER (the lowest
privilege level). If the user’s privilege level is already at the lowest level,
then the user will be disconnected by termination of their TTY connection.
If the user’s privilege level is reduced, the TTY session timeout count is
reset to its initial value.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 3
Patch 86241-06 For Rapier Switches3
PCR: 03056Module: SSH Level: 3
During an SSH session between the switch and the Secure CRT client, the
client did not receive a reply to its MAX-packet-size CMSG. The switch
does not support this message, but will now send a negative response to
satisfy the secure CRT client’s r equirements.
PCR: 03064Module: SNMP Level: 4
The MIB objects ifTestTable and ifRcvAddressTable were incorrectly included
in the switch’s SNMP implementation. These have been removed.
PCR: 03065Module: SWI Level: 2
When the TX cable was unplugged from a fibre port the operating status
was incorrectly reported as UP. This issue has been resolved.
PCR: 03070Module: BGP Level: 2
When BGP imported other route types, it would advertise r outes that had
nexthops of the BGP peers themselves. The BGP peers would reject these
routes and close the peering session, thus preventing the exchange of
routing information between BGP peers. This issue has been resolved.
PCR: 03072Module: BGP Level: 4
The Import parameter of the ADD, SET, DELETE and SHOW BGP
commands now has an INTERFACE type. INTERFACE routes were
previously grouped with STATIC routes.
PCR: 03073Module: UTILITY Level: 2
If the CREA TE QOS POLICY command was executed with a range that had
a number more than four characters long, for example, CREATE QOS
POLICY=123-12345, then a switch restart occured. An error message is now
displayed if more than four numbers are entered for a range.
PCR: 03074Module: USER Level:
The SET USER command now requires the PASSWORD option if a
PRIVILEGE is specified. This enables privilege levels to be lowered from a
higher level (MANAGER, or SECURITY OFFICER), to USER.
PCR: 03081Module: SWI Level:
An untagged packet would occasionally be sent on a tagged port. This issue
has been resolved.
PCR: 03082Module: SWI Level:
When PIM was enabled, IGMP snooping would occasionally work
incorrectly. This issue has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 03087Module: IPG Level:
When interfaces with IGMP proxies were deleted, a software re start could
sometimes occur. This issue has been resolved.
Page 4
4Patch Release Note
PCR: 03100Module: DHCP Level:
DHCP was assigning incorrect IP addresses to clients when they moved
from a relayed to a non-r elayed range. Gateway checks have been added to
remove this issue.
PCR: 03101Module: IPG Level: 2
Deriving the originating VLAN from incoming packets could, in some
circumstances, cause a software restart. This issue has been resolved.
PCR: 03102Module: IPG Level: 3
The PING command when executed with the LENGTH and PATTERN
parameters could produce an ICMP echo packet with an incorrect ICMP
checksum. This issue has been resolved.
PCR: 03104Module: IPG Level: 3
When an IP packet with an invalid TOT AL LENGTH field was received by
the CPU routing process, subsequent valid packets were dropped. This
issue has been resolved.
PCR: 03107Module: FR, PPP Level: 2
The mechanism for freeing discarded packets in Frame Relay and PPP
could, in some circumstances, cause a software r estart. Thi s issue has been
resolved.
PCR: 03108Module: MLDS Level: 4
The DISABLE MLDS command appeared twice in configur ation files. This
issue has been resolved.
PCR: 03110Module: IPG Level: 2
The ADD IP MVR command could cause a software restart. This issue has
been resolved.
The ADD IP MVR command parameter GROUP now only accepts multicast
addresses.
PCR: 03113Module: DVMRP Level: 2
With DVMRP configured, the switch did not forward multicast data to
downstream interfaces on the same VLAN. This issue has been resolved.
PCR: 03114Module: DHCP Level: 3
DHCP clients that shifted between relayed ranges were not always
recognised, and were occasionally allocated incorrect addresses. This issue
has been resolved.
PCR: 03121Module: DVMRP Level: 2
Invalid DVMRP prune messages could cause a software restart. This issue
has been resolved.
PCR: 03122Module: SWI Level: 2
Adding a static ARP entry to a trunk group could cause a software restart.
This issue has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 5
Patch 86241-06 For Rapier Switches5
PCR: 03123Module: DHCP Level: 3
After sending a DHCP NAK in response to a client’s DHCP REQUEST with
a bad lease time, the switch would fail to age out its corresponding DHCP
OFFER entry. This issue has been resolved.
PCR: 03125Module: DS3 Level: 3
The switch would disassert the AIS, IDLE, LOF and LOS alarms if the
defect conditions that had caused the alarm were disasserted, then
reasserted before the alarms had been disasserted. This issue has been
resolved.
PCR: 03127Module: IPV6 Level: 2
When a static link local address was configured using the ADD IPV6
INT=xxx IP=yyy command, it was not reflected in the switch’s dynamic
configuration. Consequently, the command would be absent from the
switch’s configuration after CREATE CONFIG and switch RESTART
commands were executed. This issue has been resolved.
PCR: 03136Module: BGP Level: 2
The ADD BGP PEER command MAXPREFIX parameter now has a default
of 24000, instead of OFF. Previously , with no maximum pr efix checking by
default, if the switch received a very large number of prefixes from a BGP
peer, buffer exhaustion could result in a software re start.
PCR: 03011Module: OSPF Level: 3
The SHOW OSPF NEIGHBOUR command did not reflect a change made to
the router priority on a dynamic OSPF interface of a neighbouring router.
This issue has been resolved.
PCR: 03035Module: OSPF
Link state advertisements could incorrectly show an area as a stub area.
This happened during the time when a Direct Route (DR) was removed
from a configuration and before a Direct Backup Route (BDR), or an Other
Direct Route (Other DR) was elected. This issue has been resolved.
PCR: 03045Module: IPG, SWI Level: 3
The switch would flood DVMRP unicast messages to all ports in the VLAN.
This issue has been resolved.
PCR: 03046Module: IPG Level: 3
ICMP packets originating from the switch used the wrong Equal Cost
Multiple Path route. This issue has been resolved. Also, improvements have
been made to ensure that the ICMP packet will be transmitted over the best
available route. If the best route becomes unavailable, a new route will be
found, if available, so that the ICMP packet continues to reach the
destination address.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 03051Module: PCI Level: 2
The ECPAC card was not working correctly. This issue has been resolved.
Page 6
6Patch Release Note
Features in 86241-05
Patch file details are listed in Table 2:
Table 2: Patch file details for Patch 86241-05.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-241.rez
17-Jan-2003
86241-05.paz
332388 bytes
Patch 86241-05 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR: 02315Module: SNMPNetwork affecting: No
Support has been added for SNMPv2c.
SNMP responses will be sent in the same version format as the request
message. Minimal configuration is required to specify a SNMP format,
because this is decided on a message by message basis. The on ly thing you
need to specify is the version of SNMP received by trap hosts.
DS3 interface and board type support has been added. DS3 is now
supported over PPP and Frame Relay. DS3 MIB support has been added.
For more information on DS3, see “DS 3 Interfaces” on page 22 of this release
note.
PCR: 02414Module: IPv6, SWI, IPG, VLANNetwork affecting: No
This patch resolves issues that arose after previous modifications made
under this PCR number.
Sometimes IPv6 features did not enable correctly. Also, there were some
errors in the output from configuration commands. These issues have been
resolved.
PCR: 02560Module: IPG, SWI, VLANNetwork affecting: No
IP packet throughput has been improved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 7
Patch 86241-06 For Rapier Switches7
PCR: 03002 Module: USERNetwork affecting: No
Debugging commands are now available for the RADIUS and TACACS
control protocols. Raw packets, decoded packets, and errors can now be
displayed.
Access control packet debugging allows the contents of the packets to be
viewed. The debugging commands allow both raw (hexadecimal dumps)
and/or decoded (human-readable) packet displays. Information on any
errors occurring in the transactions can be displayed once the appropriate
debugging command is issued.
Only users with SECURITY OFFICER privileges in system secure mode are able to
enable RADIUS and TACACS debugging.
The SET INSTALL command was generating an unwanted warning
message on Rapier i series switches. This issue has been resolved.
Features in 86241-04
Patch file details are listed in Table 3:
Table 3: Patch file details for Patch 86241-04.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-241.rez
15-Jan-2003
86241-04.paz
208232 bytes
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Patch 86241-04 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR 02244Module: UTILITYNetwork affecting: No
Virtual interfaces were displayed incorrectly when VLANs were
multihomed. This issue has been resolved.
PCR: 02300Module: FirewallNetwork affecting: No
If the command ADD FIREW ALL POLICY RULE SOURCEPOR T=ALL was
executed, a value of “65535” was incorrectly displayed for the
SOURCEPORT parameter for that rule in the SHOW FIREWALL POLICY
command. This issue has been resolved.
Page 8
8Patch Release Note
PCR: 02340Module: IPGNetwork affecting: No
PIM was disabled permanently if the RESET IP command, or the DISABLE
IP command followed by the ENABLE IP commands were executed. PIM is
now automatically restarted if these commands are used.
PCR: 02356Module: FIREWALLNetwork affecting: No
Previously the SET FIREWALL POLICY RULE command permitted the use
of the GBLIP and GBLPORT parameters in ways that were not permitted by
the ADD FIREWALL POLICY RULE command. This caused problems
when a configuration file was generated because some of the illegal
parameters from the SET command wer e put i nto the ADD command. This
resulted in a configuration that contained illegal parameter combinations.
The restrictions placed on the GBLIP and GBLPOR T parameters in the ADD
command have now been implemented in the SET command so that these
problems do not occur.
PCR: 02358Module: IPGNetwork affecting: No
IP ARP packets that had invalid header values were erroneously accepted
by the router. Also, IP packets with a Class E source IP address were
erroneously fowarded. These issues have been resolved.
PCR: 02371Module: FIREWALLNetwork affecting: No
When the system time was set to a time that was before or significantly after
the current time, Firewall sessions were prematur ely deleted. This issue has
been resolved.
PCR: 02400Module:
Network affecting: No
CORE,FFS,FILE,INSTALL,SCR
If a problem occurred with NVS, some critical files were lost. As a result, the
equipment was forced to load only boot ROM software at boot time. This
patch combined with the new version of the boot ROM software (pr1-1.2.0
for the AR700 series) resolves this issue.
PCR: 02491Module: IPGNetwork affecting: No
The ARP cache is now updated when a gratuitous ARP request or reply
packet is received.
PCR: 02506Module: OSPF IPGNetwork affecting: No
The ADD IP ROUTE FILTER optional parameter INTERFACE caused the
filter to not work on the OSPF external LSA’s flooding.
The SHOW IP ROUTE FILTER interface name output was truncated to 6
characters. These issues have been resolved.
PCR: 02511Module: PingNetwork affecting: No
Executing the PING command sometimes caused a memory leak. This issue
has been resolved.
PCR: 02514Module: IPGNetwork affecting: No
The CREATE CONFIGURATION command inserted the IMTLEAVE
parameter into the configuration script when the IMTLEAVE parameter
was undefined. This caused an error in the configuration script. This issue
has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 9
Patch 86241-06 For Rapier Switches9
PCR: 02519Module: IPv6Network affecting: No
The DELETE IPV6 6T04 command sometimes caused an error. This issue
has been resolved.
PCR: 02521Module: IPv6Network affecting: No
The DECREMENT parameter of the ADD IPV6 INTERF ACE command was
not recognised in the command line. This issue has been resolved.
PCR: 02523Module: QOS, UTILITYNetwork affecting: No
The SET QOS TRAFFICCLASS command now requires 7 characters to be
entered for the optional EXCEEDACTION and EXCEEDREMARKVALUE
parameters.
PCR: 02525Module: TELNET, PING, IPV6,
Network affecting: No
TCP
The ADD IPV6 HOST command was not accepting the INTERFACE
parameter when adding a host with a link-local address. This issue has been
resolved.
PCR: 02526Module: DVMRPNetwork affecting: No
Under some circumstances, multiple default routes were created for
DVMRP. This issue has been resolved.
PCR: 02527Module: TCPNetwork affecting: No
TCP did not send a TCP Reset message under some circumstances, for
example when the T elne t server was disabled. This issue has been resolved.
PCR: 02529Module: FIREWALLNetwork affecting: No
The source IP address is now checked correctly when subnet NAT is used
with standard, double, or reverse NAT. Previously, it was sometimes
possible to specify an IP address outside the allowable range.
PCR: 02532Module: FIREWALLNetwork affecting: No
The Firewall showed the wrong counters on Total Received Packets and
Dropped Packets and displayed twice the number of received packets when
discarding packets from the public side. Also, when a Deny rule was
applied to the private side, the Number of Dropped Packets was always
zero. These issues have been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 02534Module: TESTNetwork affecting: No
The SYN test did not operate successfully when patch 52241-03 was
installed. This issue has been resolved.
PCR: 02535Module: IPV6Network affecting: No
A fatal error occurred when an IPv6 packet with an invalid payload length
was received. This issue has been resolved.
PCR: 02537Module: L2TPNetwork affecting: No
When PPP was used over an L2TP tunnel, a speed of zero was shown for
the PPP interface on the LNS side, while the LAC side showed a non-zero
Page 10
10Patch Release Note
PPP interface speed. This issue has been resolved so that the LNS side of the
PPP interface shows the correct speed.
PCR: 02538Module: DVMRPNetwork affecting: No
The source mask is now al ways 0xffffffff in th e DVMRP forwardin g table.
The temporary route in the DVMRP route table was not displaying
correctly. This issue has been resolved.
An IGMP entry was erroneously added for the reserved IP address. This
issue has been resolved.
PCR: 02539Module: CLASSIFIERNetwork affecting: No
The TCP and UDP source and destination port parameters would accept
values of more than 65535. 65535 is now the maximum value for source and
destination ports. This complies with RFC768 for UDP and RFC793 for TCP.
PCR: 02542Module: IPV6Network affecting: No
The SHOW IPV6 commands were incorrectly including RIPng down r outes,
and routes on the sending interface. The IPv6 r outing table now r ecognises
down routes.
PCR: 02543Module: SWINetwork affecting: No
BPDU messages are now sent to all active ports as soon as STP is enabled.
PCR: 02547Module: IPGNetwork affecting: No
The ARP transmit counter total was not being incremented. This issue has
been resolved.
PCR: 02550Module: FIREWALLNetwork affecting: No
The standard subnet NAT rules on a private interface were not matching a
packet unless its source IP address was exactly the same as the IPADDRESS
value set for the rule, that is the NAT mask value was not being used. This
issue has been resolved.
PCR: 02551Module: IPGNetwork affecting: No
Reserved multicast data was being duplicated. This issue has been resolved.
PCR: 02552Module: SWINetwork affecting: No
If ingress filtering was supported within trunk groups, ports with ingress
filtering enabled were erro neously added to the trunk gr oup. This issue has
been resolved.
PCR: 02564Module: FIREWALLNetwork affecting: No
Large RTSP continuation packets could cause a fatal error. This issue has
been resolved.
PCR: 02565Module: CLASSIFIERNetwork affecting: No
The SET CLASSIFIER and CREATE CLASSIFIER commands now display
the tagged and untagged parameters correctly when the PROTOCOL
parameter is set to IPX or 802.2.
PCR: 02572Module: IPGNetwork affecting: No
An issue introduced in a previous patch with the SET IP ROUTE command
failing has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 11
Patch 86241-06 For Rapier Switches11
PCR: 02574Module: DVMRPNetwork affecting: No
Some change actions, and the resending of prune messages were not
operating correctly. This issue has been resolved.
PCR: 02579Module: FIREWALLNetwork affecting: No
The ADD FIREWALL POLICY and SET FIREWALL POLICY commands
did not generate a valid port list when the optional PORT parameter was set
to ALL. This issue has been resolved.
PCR: 02587Module: OSPFNetwork affecting: No
When OSPF was enabled on startup, an OSPF interface would sometimes
stay in the DOWN state. This issue has been resolved.
Features in 86241-03
Patch file details are listed in Table 2.
Table 4: Patch file details for Patch 86241-03.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-241.rez
26-Nov-2002
86241-03.paz
379165 bytes
Patch 86241-03 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR: 02314Module: IPGNetwork affecting: No
Incorrect ICMP checksums on incoming packets were not being r ecognised,
and packets with an odd byte size were erroneously being pr ocessed. These
issues have been resolved.
PCR: 02414Module: IPv6, SWI, IPG, VLANNetwork affecting: No
MLD snooping is now supported on AT-9800 Series Switches and Rapi er i
Series Switches.
PCR: 02426Module: IPv6Network affecting: No
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
The ENABLE IPV6 MTUDISCOVERY and SET IPV6 MTU INTERFACE
commands were not displayed in the SHOW CONFIGURATION
DYNAMIC command. This issue has been resolved.
PCR: 02428Module: IPv6Network affecting: No
Link-local address behaviour was incorrect. Also, the PUBLISH parameter
was not updated by the SET IPV6 INTERFACE command, or displayed in
the SHOW IPV6 INTERFACE command. These issues have been resolved.
PCR: 02467Module: CORENetwork affecting: No
The board descriptions have changed for some instances of AT-9800 Series
Switches.
Page 12
12Patch Release Note
PCR: 02469Module: TMNetwork affecting: No
After an ASYN port test, the port is now reset to its pre-test state if the test
was started by a user connected to the same ASYN port.
PCR: 02477Module: IPG, PIM, SWINetwork affecting: No
The following issues have been resolved:
•When equal paths exist to a source, a PIM DM downstream switch/
router could not correctly collect information from AssertSelection
between the upstream devices.
•If the Assert winner was another vendor’s device, The Allied Telesyn
device did not respond to the Prune message.
•Sometimes a receiver could not get a multicast data stream.
•If unicast r outes were changed, multicast data streams sometimes failed
to reach receivers or flowed incorrectly.
PCR: 02481Module: IPv6Network affecting: No
A fatal error occurred with IPv6 ping when an in terface was plugged in and
unplugged repeatedly. This issue has been resolved. Also, the TrueMTU
value on a VLAN interface was incorrect. This value has been corrected to
1500.
PCR: 02482Module: IPGNetwork affecting: No
When pinging an unreachable host via a switch, there was a delay before the
switch sent a DestinationUnreachable message. This iss ue has been r esolved.
PCR: 02489Module: SWINetwork affecting: No
When the switch was under heavy learning load, some MAC address were
lost. This issue has been resolved.
PCR: 02494Module: IPv6Network affecting: No
It was possible to add the same IPv6 prefix to different IPv6 interfaces. This
issue has been resolved.
PCR: 02495Module: VLANNetwork affecting: No
The ADD VLANRELAY and D E LE TE VLANRELAY command s returned
the wrong message if the command could not be processed. This issue has
been resolved.
PCR: 02498Module: VLANNetwork affecting: No
The correct protocol number is now returned by VLAN Relay.
PCR: 02499Module: IPGNetwork affecting: No
Some parameters in the SET IP IGMP command had incorrect ranges. This
issue has been resolved. The correct ranges are:
SET IP IGMP [LMQI=1..255] [LMQC=1..5] [QUERYINTERVAL=1..65535]
[QUERYRESPONSEINTERVAL=1..255] [ROBUSTNESS=1..5]
[TIMEOUT=1..65535]
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 13
Patch 86241-06 For Rapier Switches13
PCR: 02502Module: Ping, IPv6Network affecting: No
If multiple IPv6 interfaces shared the same link-local address, pings to the
link-local address sometimes failed. This issue has been resolved.
PCR: 02509Module: DVMRPNetwork affecting: No
The source net mask has been removed from DVMRP prune, graft and
graft-ack messages.
Features in 86241-02
Patch file details are listed in Table 5:
Table 5: Patch file details for Patch 86241-02.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-241.rez
25-Oct-2002
86241-02.paz
132368 bytes
Patch 86241-02 includes all issues resolved and enhancements released in
previous patches for Software Release 2.4.1, and the following enhancements:
PCR: 02103Module: SWINetwork affecting: No
IPX traffic passing between two switch instances using VLAN for Rapier48
now operates correctly.
PCR: 02210Module: DNS RelayNetwork affecting: No
Buffer leaks occurred when DNS relay was enabled. This issue has been
resolved.
PCR: 02214Module: IPGNetwork affecting: No
A buffer leak occurred when a lar ge number of flows (over 4000) were in use
and needed to be recycled. This issue has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 02220Module: SWINetwork affecting: No
The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET
SWITCH L3FILTER ENTRY commands was matching multicast and
broadcast packets with software filtering. This issue has been resolved.
PCR: 02236Module: FIREWALLNetwork affecting: No
Sometimes the retransmission of an FTP packet was not permitted through
the Firewall. This issue has been resolved.
PCR: 02245Module: VRRPNetwork affecting: No
VRRP returned an incorrect MAC address for an ARP request. This issue
has been resolved.
Page 14
14Patch Release Note
PCR: 02263Module: VRRPNetwork affecting: No
The virtual MAC address was used as the source MAC for all packets
forwarded on an interface associated with a Virtual Router (VR). This was
confusing when multiple VRs were defined over the same interface because
only one virtual MAC address was ever used. The other virtual MAC
addresses (for the other VR's) were only used if the source IP address
matched the VR’s IP address. To avoid this confusion, the system MAC
address is now always used unless the source IP addr ess of the packet is the
same as the VR’s IP address.
PCR: 02267Module: BGPNetwork affecting: No
When route aggregation was enabled, the atomic aggregate was not being
set. This issue has been resolved.
PCR: 02268Module: FIREWALLNetwork affecting: No
HTTP requests from a fixed IP addr ess were erroneously r eported as a host
scan attack in the Firewall deny queue. This issue has been resolved.
PCR: 02272Module: IPG, PIM, SWINetwork affecting: No
The following issues have been resolved:
•The RESET PIM INTERFACE=VLAN command was not working
correctly.
•Packets with Time to Live (TTL) set to less than 4 were not being
forwarded.
•VLAN tags were not being inserted into IP multicast packets on multitagged ports.
•A fatal error occurred when PIM and RIP were both running.
PCR: 02274Module: TPADNetwork affecting: No
ARL message interrupts have been re-enabled after a software table rebuild
to fix synchronisation of the software forwarding database with the
hardware table.
PCR: 02276Module: FIREWALLNetwork affecting: No
The CREATE CONFIG command did not save the SOURCEPORT
parameter to the configuration file when the low value of the source port
range was set to zero. This issue has been resolved.
PCR: 02277Module: DVMRPNetwork affecting: No
Report sending and default routes were not working correctly. Also, the
SHOW CONFIGURATION DYNAMIC and SHOW
CONFIGURA TION=DVMRP commands were not working correctly . These
issues have been resolved.
PCR: 02280Module: TELNET, TTYNetwork affecting: No
TELNET sessions are now closed with “^D” only when the session is in the
login state.
PCR: 02291Module: DHCPNetwork affecting: No
DHCP now processes Discover messages smaller than 300 bytes.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 15
Patch 86241-06 For Rapier Switches15
PCR: 02292Module: IPSECNetwork affecting: No
IPSec no longer logs packets that match an ACTION=ALLOW policy. The
overhead of this logging was affecting non-IPSec traffic.
PCR: 02294Module: IKMPNetwork affecting: No
The LOCALRSAKEY parameter in the CREA TE ISAKMP POLICY and SET
ISAKMP POLICY commands was not accepting the value zero. This issue
has been resolved.
PCR: 02298Module: IPSECNetwork affecting: No
The PURGE IPSEC command caused a fatal error. This issue has been
resolved.
PCR: 02299Module: VRRPNetwork affecting: No
If a packet with a destination IP address equal to a VRRP IP address was
received when the router didn’t own the IP addr ess, (because it didn’t have
an interface with that IP address) the router incorrectly tried to forwar d the
packet and send an ICMP “redirect” message to the source. Now, if such a
packet is received, it will be discarded and an ICMP “host unreachable”
message will be sent to the source.
PCR: 02301Module: IPGNetwork affecting: No
If a DNS relay agent was configured with overlapping subnets, sometimes
the DNS server response was returned to the client with a source IP addr ess
of an interface on the relay agent that was different from the interface the
request was received on. This issue has been resolved.
PCR: 02302Module: IPv6Network affecting: No
The default router lifetime value has been corrected. Also, the SET IPV6
INTERFACE command now updates valid and preferred lifetimes correctly .
PCR: 02303Module: INSTALLNetwork affecting: No
When enabling or disabling feature licences, a message will now be
generated with a warning that changes to feature licences may not take
effect until after a reboot.
PCR: 02304Module: VRRPNetwork affecting: No
VRRP used the wrong source IP address in ICMP redir ects. RFC 2338 states
that the source IP address of ICMP redirects should be the IP address that
the end host used when making its next hop routing decision. In the case of
a packet sent to a VRRP virtual MAC address, this is the primary VRRP IP
address associated with the MAC addr ess, provided such a VR exists and is
in the master state. This issue has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 02309Module: STPNetwork affecting: No
On models except Rapier i Series Switches, the ENABLE STP DEBUG PORT
command did not work correctly. This issue has been resolved.
PCR: 02311Module: SWINetwork affecting: No
It was possible to set the trunk speed to 10/100M, even if the port within the
trunk was not capable of this speed. This issue has been resolved.
Page 16
16Patch Release Note
PCR: 02313Module: IPV6Network affecting: No
The SHOW IPV6 INTERFACE command now shows the address lifetime
aging status that is determined by the DECREMENT parameter in the ADD
IPV6 INTERFACE command. The default valid and preferred address
lifetimes have been changed to 30 days and 7 days respectively.
PCR: 02320Module: IPV6Network affecting: No
The interface address preferred lifetime was not operating correctly. This
issue has been resolved.
PCR: 02321Module: FRNetwork affecting: No
A fatal error occurred when the command SET FR=0 LMI= was exe cuted if
the LMI was already set to ANNEXA, ANNEXB or ANNEXD. This issue
has been resolved.
PCR: 02326Module: IPv6Network affecting: No
A fatal error occurred when a PING was executed ove r an IPV6 tunnel that
had previously been deleted. Also, packet forwarding with link-local
addresses was not working correctly. These issues have been resolved.
PCR: 02327Module: IPG/FIREWALLNetwork affecting: No
In some situations, multihomed interfaces caused the Firewall to apply
NAT and rules incorrectly when packets were received from a subnet that
was not attached to the receiving interface. This issue has been resolved.
PCR: 02328Module: BGPNetwork affecting: No
BGP was not sending a withdraw message to a peer for a withdrawn or
replaced route when the new best route came from that peer. This issue has
been resolved.
PCR: 02330Module: IPv6Network affecting: No
A buffer leak was occurring in IPv6 fragmentation. This issue has been
resolved.
PCR: 02331Module: IPG, ETHNetwork affecting: No
IP is now informed when an Ethernet interface goes up or down, after a 2.5
second delay.
PCR: 02332Module: IPSECNetwork affecting: No
The sequence number extracted from the AH and ESP header was in the
wrong endian mode, which caused an FTP error with IPSEC anti-replay.
This issue has been resolved.
PCR: 02334Module: FIREWALLNetwork affecting: No
It is now possible to set the domain name of the SMTP server to none
(0.0.0.0) with the SET FIREWALL POLICY SMTPDOMAIN command, even
if a server name has not previously been specified.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 17
Patch 86241-06 For Rapier Switches17
PCR: 02335Module: CLASSIFIERNetwork affecting: No
The SHOW CLASSIFIER command was not displaying Layer 3 information
if the classifier had been created with the parameters ETHFORMAT=SNAP
and PROTOCOL={IP|0000000800}. This issue has been resolved.
PCR: 02343Module: PPPNetwork affecting: No
When acting as a PPPoE Access Concentrator (AC), if a PPPoE client sent
discovery packets without the "host-unique" tag, the discovery packets sent
by the AC were corrupted. This issue has been resolved.
PCR: 02346Module: BGP, IPGNetwork affecting: No
It is now possible to set a preference value for dynamically learned routes
based on their protocol using the command:
The CREATE CONFIGURATION command was not correctly generating
the DISABLE SWITCH HWFILTER and DISABLE SWITCH L3FILTER
commands. This issue has been resolved.
PCR: 02348Module: ENCONetwork affecting: No
When the PAC card was under severe load, the related driver occasionally
did not fully transfer all result data fr om the chip. This caused an actCmdFail
error. This issue has been resolved.
PCR: 02354Module: SCC, SYN, PPPNetwork affecti ng: No
In a previous patch, a fatal error occurred after a RESTART ROUTER
command was executed when using PPP over SYN. Also, on AR745
models, PPP was using an 8 MB boundary instead of a 16 MB boundary.
These issues have been resolved.
PCR: 02357Module: FRNetwork affecting: No
The following issues have been resolved:
•PIM was not sending Hello messages over a Frame Relay (FR) interface.
•A fatal error occurred if 64 was entered as the interface value in the
DESTROY FRAMERELA Y command. The command now only accepts
0-63 for this parameter.
•The ADD FRAMERELAY DLC command incorrectly accepted a TYPE
parameter. Also, this command was not accepting the
ENCAPSULATION parameter.
•The CREATE CONFIGURATION command incorrectly generated the
CIR and CIRLIMITED parameters for the ADD FRAMERELAY DLC
command.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
•FR interfaces with static DLCs were always shown as DOWN. The
status of the interface was not being updated when a circuit was added
to the interface.
Page 18
18Patch Release Note
PCR: 02359Module: IPGNetwork affecting: No
When an IP Multihomed interface was used as an OSPF interface,
neighbour relationships were only established if the IP interface for OSPF
was added first in the configuration. Now, OSP F est ablis hes neig hbour
relationships regardless of the IP Multihomed interface configuration order .
PCR: 02363Module: FFS, FILE, TTYNetwork affecting: No
The FLASH compaction process is now transparent to the file edition
process. The FLASH system is now more stable.
PCR: 02365Module: SWINetwork affecting: No
Address learning on the mirror port is now correctly re-enabled when it is
no longer the mirror port.
PCR: 02367Module: SWINetwork affecting: No
New commands have been added to enable the addition and deletion of
static multicast addresses to and from the multicast forwarding table. The
new commands are:
When the SET IP ROUTE command was executed to change any parameter
other than METRIC1, which is the RIP metric, the RIP metric was reset to 1.
This metric is now only updated if a value for the parameter is specified.
PCR: 02371Module: FIREWALLNetwork affecting: No
When the system time was set to a time that was before or significantly after
the current time, Firewall sessions were prematur ely deleted. This issue has
been resolved.
PCR: 02376Module: PPPNetwork affecting: No
When the PPP ONLINELIMIT was exceeded for PPP over TDM, the PPP
link stayed open, allowing Link Quality Report (LQR) packets to be
transmitted. This caused the ifOutOctets counter to increment. Now, if the
ONLINELIMIT is exceeded, the link will close.
PCR: 02378Module: SWINetwork affecting: No
Entering 63 for the EPORT parameter in the ADD SWITCH L3FILTER
command caused a fatal error. This parameter now accepts the values 63
and 64.
PCR: 02395Module: VRRP, TRGNetwork affecting: No
The SHOW VRRP command now shows the number of trigger activations
for the Upmaster and Downmaster triggers.
PCR: 02397Module: DVMRPNetwork affecting: No
After a prune lifetime had expired, the interface was not joined back to the
DVMRP multicast delivery tree. This issue has been resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 19
Patch 86241-06 For Rapier Switches19
PCR: 02398Module: IPV6Network affecting: No
The following issues have been resolved:
•It was possible to assi gn the same network on different IPV6 interfaces
•The loopback address was being added to other interfaces
•The tunnel configuration was not showing correctly in IPV6
configuration commands
RIPv6 now sets the metric of routes for interfaces that are DOWN to 16, and
immediately sends responses when the link status of VLAN interfaces
changes.
PCR: 02399Module: TRACENetwork affecting: No
The Trace utility has been modified. Previously, Trace sent a group of
packets at once and waited for multiple responses in order to assess the
minimum, maximum and average time to cover a certain "hop distance"
towards the target host. Now Trace sends each packet in each group
individually, and waits either for a response or a time-out before sending
the next packet in the group.
PCR: 02401Module: IPV6Network affecting: No
Neighbour discovery and PIM6 caused a fatal error when IPv6 was not
enabled, or when the IPv6 feature license was not present. This issue has
been resolved.
PCR: 02402Module: SNMP, CORE, SHOW,
Network affecting: No
FILE
SNMP MIB support has been enhanced for CPU utilisation and file
statistics. MIB support has been added for Allied T elesyn contact details and
fast buffers.
PCR: 02403Module: STPNetwork affecting: No
A watchdog timeout occurred when the command ENABLE STP PORT was
executed. This issue has been resolved.
PCR: 02406Module: IPV6Network affecting: No
A Router-Alert option has been added. Also, the SHOW IPV6 MLD
INTERFACE command now works correctly.
PCR: 02409Module: IPGNetwork affecting: No
A warning now appears when the DELETE IP INTERFACE command is
executed before the DELETE DVMRP INTERFACE command.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
PCR: 02410Module: VRRPNetwork affecting: No
VRRP pre-empt mode was not working with advertisement updates of 1
second or more because this did n ot allow for interface st art time on startup.
Now a check is made to verify that interfaces are UP before timers are
started.
PCR: 02411Module: IPV6Network affecting: No
The SHOW TCP command was not showing the listening status for IPv6.
Page 20
20Patch Release Note
PCR: 02412Module: IPV6Network affecting: No
An ISDN call was activated by IPv6 Router Advertisements over IPv6
tunnel interfaces. This issue has been resolved.
PCR: 02415Module: IPGNetwork affecting: No
Packets with a RIP source address and next hop address that are not on the
same subnet as the interface will now be processed. If the received next hop
is not on the same subnet, it is treated as 0.0.0.0.
PCR: 02418Module: IPV6Network affecting: No
ICMPv6 was returning an error for non-zer o fragment offsets. This is sue has
been resolved.
PCR: 02421Module: PIMNetwork affecting: No
The GUI was incorrectly accepting multiple entries for VLANs. This issue
has been resolved.
PCR: 02422Module: GARPNetwork affecting: No
The GUI was returning incorrect GARP counters. This issue has been
resolved.
PCR: 02428Module: IPV6Network affecting: No
Link-local address behaviour was incorrect. Also, the PUBLISH parameter
was not updated by the SET IPV6 INTERFACE command, or displayed in
the SHOW IPV6 INTERFACE command. These issues have been resolved.
PCR: 02450Module: IPV6Network affecting: No
Large local packets were not being fragmented. Also, the More Fragment
flag in the IPv6 fragment header was not being set correctly. These issues
have been resolved.
PCR: 02452Module: IPv6Network affecting: No
Received Router Advertisements (RAs) were discarded when the interface
was enabled to send RAs. This issue has been resolved.
PCR: 02457Module: IPV6Network affecting: No
The IPv6 priority filter was not matching correctly when TCP was specified
as the protocol type. This issue has been resolved.
PCR: 02463Module: DVMRP, IPGNetwork affecting: No
Multicast multi-homing was not working correctly. This issue has been
resolved.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 21
Patch 86241-06 For Rapier Switches21
Features in 86241-01
Patch file details are listed in Table 6:
Table 6: Patch file details for Patch 86241-01.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-241.rez
26-July-2002
86241-01.paz
27732 bytes
Patch 86241-01 includes the following enhancements:
PCR: 02036Module: SWITCHNetwork affecting: No
A new command allows the Layer 3 aging timer to be changed:
SET SWITCH L3AGEINGTIMER=<seconds>
where seconds can be 30 - 43200. After each cycle of the ageing timer, all
existing Layer 3 entries with the hit bit set will have the hit bit reset to zero,
and all existing Layer 3 entries with the hit bit set to zero will be deleted.
The SHOW SWITCH command output now displays the Layer 3 ageing
timer value.
PCR 02138Module: SWINetwork affecting: No
The built in Self Test Code for all Rapiers, except G6, has been improved to
enhance the detection of faults in switch chip external packet memory.
PCR: 02158Module: FIREWALLNetwork affecting: No
When a TCP RST/ACK was received by a firewall interface, the packet that
was passed to the other side of the firewall lost the ACK flag, and had an
incorrect ACK number. This issue has been resolved.
PCR: 02185Module: VRRPNetwork affecting: No
The SHOW CONFIG DYNAMIC=VRRP command was not showing port
monitoring and step values correctly. This issue has been resolved.
PCR: 02229Module: IPGNetwork affecting: No
The PURGE IP command now resets the IP route cache counters to zero.
PCR: 02240Module: SWINetwork affecting: No
The SENDCOS filter action did not operate correctly across switch
instances. This was because the stacklink port on the Rapier 48 did not
correctly compensate for the stack tag on frames r eceived via the filte r. This
issue has been resolved.
PCR: 02241Module: FIREWALLNetwork affecting: No
Firewall subnet NAT rules were not working correctly from the private to
the public side of the firewall. Traffic from the public to private side
(destined for subnet NA T) was discar ded. These issues have been r esolved.
ICMP traffic no longer causes a RADIUS lookup for access authentication,
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 22
22Patch Release Note
but is now checked by ICMP handlers for attacks and eligibility . If the ICMP
traffic matches a NAT rule, NAT will occur on inbound and outbound
traffic. HTTP 1.0 requests sometimes caused the firewall HTTP proxy to
close prematurely. Cached TCP sessions were sometimes not hit correctly.
These issues have been resolved.
PCR: 02242Module: IPGNetwork affecting: No
On a Rapier 24, adding an IP interface over a FR interface caused an
ASSERT debug fatal error. This issue has been resolved.
PCR: 02250Module: FIREWALLNetwork affecting: No
Sometimes the Firewall erroneously used NAT. This issue has been
resolved.
PCR: 02259Module: DHCP, IPGNetwork affecting: No
A dual Ethernet router was incorrectly accepting an IP address from a
DHCP server when the offered address was on the same network as the
other Ethernet interface. An error is now recorded when DHCP offers an
address that is in the same subnet as another interface.
DS3 Interfaces
The A T-RP24i/DS3 provides one standards-based unchannelised DS3
interface. The interface has the following features:
■44.736 Mbit/s interface rate, 44.210 Mbit/s payload data rate
■Separate transmit (Tx) and receive (Rx) BNC connectors
■75-ohm impedance
■B3ZS line encoding
■Automatic compensation for lines up to 135m (450ft)
■Loop or internal timing
■C-bit framing
■Support for PPP and Frame Relay encapsulation
The interface meets the following specifications:
■ANSI T1.103, Digital Hierarchy - Synchronous DS3 Format
■ANSI T1.107, Digital Hierarchy - Formats
■ANSI T1.231, Digital Hierarchy - Layer 1 In-Service Digital
■RFC 2496 (DS3 MIB)
Digital Signal 3 (DS3) is a classification of digital signals, and sits at Layer One
of the OSI model. The purpose of Layer One is to provide a transmission link
between two entities and to monitor the quality of the link. In DS3 the link
monitoring is achieved by adding overhead information alongside the data
payload.
The DS3 interface rate is 44.736 Mbit/s with a payload rate of 44.210 Mbit/s.
The signal is partitioned into Multi-frames (M-frames), and the M-frames are
partitioned into seven M-subframes. Each M-subframe is further subdivided
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 23
Patch 86241-06 For Rapier Switches23
into 8 blocks of 85 bits with 84 bits available for payload, and one bit for
framing overhead. The frame structure is shown in Figure 1 on page 23.
Figure 1: DS3 Framing Structure.
M-Frame 4760 bits
M3
X1
X2P1P2
679
Bits
679
Bits
M1
679
Bits
First M-Subframe 680 bits
679
Bits
679
Bits
M2
679
Bits
679
Bits
X1
84
INFO
84
F1
INFO
84
C1F2
INFO
84
INFO
84
C2C3F3
INFO
84
INFO
84
INFO
84
F4
INFO
DS31
The switch with the DS3 interface is called the near end. The entity the switch
connects to is called the far end. X1 and X2 are set to 1 if the near end is
receiving an Alarm Indication Signal (AIS), a Loss Of Frame (LOF), or a Loss Of Signal (LOS). This allows the near end to indicate to the far end that it is
experiencing a problem and is known as Far End Receive Failure (FERF).
P1 and P2 form the P-bit channel. They provide parity information for the
preceding M-frame.
M1, M2, and M3 form a frame alignment channel used by the hardware to locate
all seven M-subframes.
F1, F2, F3, and F4 form an M-subframe alignment channel which is used by the
hardware to identify all frame overhead bit positions.
C1, C2, and C3 form the C-bit channel.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
C-bit Parity Mode
In C-bit parity mode the C-bits are described as follows:
■The first C-bit in M-subframe 1 is set to 1 to identify the format as C-bit
parity. If this is zero the format is assumed to be M23.
■The second C-bit in M-subframe 1 is designated Nr and is set to 1.
■The third C-bit in M-subframe 1 provides the Far End Alarm and Control
signal (FEAC) which is used to:
•Send alarm or status information from the far end back to the near end.
•Initiate DS3 loopbacks.
The three C-bits in M-subframe 3 are designated as CP-bits and are used to
implement CP-bit parity. At the near end the CP-bits are set to the same value
as the P-bits. The parity of the CP-bits of frame N are compared with the parity
of the CP-bits of frame N+1. A difference in parity between N and N+1 is
deemed a CP-bit parity error.
Page 24
24Patch Release Note
The three C-bits in M-subframe 4 are designated as FEBE bits. The FEBE bits
are returned to the far end to indicate the occurrence of a framing error or CPbit parity error. If none occur, the FEBE bits are set to all ones. One or all of the
FEBE bits are set to zero if a CP-bit parity error or an error in the F or M bits is
found.
The three C-bits in M-subframe 5 are assigned as a 28.2kbits/s terminal-toterminal-path maintenance data link. This data link can be switched off at the
command interface, If it is switched off, the C-bits in M-subframe 5 are set to all
ones. If switched on, the maintenance channel can convey the following
information:
■Path Identification Signal.
A set of ASCII text strings that can be used to uniquely identify this
particular DS3 path. This can be useful if the DS3 signal is, at some point in
its path, multiplexed into a higher order signal such as DS4 or OC-3. It is
common for lower-order signals to be switched within a cross-connect. If
this happens it is possible that the wrong DS3 signal is switched thr ough to
the switch. When this happens the overhead bits are all correct, so there is
no indication that the wrong signal has been applied. The Path
Identification Signal can be agreed by the two parties at either end of the
network and tested to ensure that it is the right DS3 signal that has been
received.
■Idle Signal.
A set of ASCII text strings that can be used to provide the location of the
source of an idle signal.
■Test Signal.
A set of ASCII text strings that can be used to provide the location of the
source of a test signal.
These signals are sent once every second. All other C-bits are for future use.
Loopbacks
The DS3 interface provides four types of loopback; line, payload, diagnostic,
and remote. These loopbacks are activated by the ENABLE DS3 TEST
command.
Line loopback is shown in Figure 2 on page 24. In this loopback mode the
receive signal is looped straight to the transmit signal.
Figure 2: Line Loopback.
TX
Far End
RX
RX
DS3 NSM
TX
DS32
Payload loopback is similar to line loopback. The difference is that only the
payload load is looped back from receive to transmit. The overhead is sourced
from the DS3 NSM.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 25
Patch 86241-06 For Rapier Switches25
Diagnostic loopback is shown in Figure3 on page 25. In this loopback mode
the transmit signal is connected straight to the receive signal.
Figure 3: Diagnostic Loopback.
TX
Far End
RX
RX
DS3 NSM
TX
DS33
In C-bit parity mode it is also possible for the switch to request a loopback at
the far end. This is shown in Figure 4 on page 25. This is achieved using the
FEAC channel. The switch can also respond to remote loopback requests via
the FEAC channel from the far end. This results in a near end Line Loopback
(see above).
Figure 4: Remote Loopback.
TX
Far End
RX
RX
DS3 NSM
TX
DS34
Note that it is possible to configure near end local and remote loopbacks at the
same time.
DS3 Configuration
The DS3 interface on the switch is automatically configured by the software
modules when the switch sets up. Certain aspects of the DS3 signal can be
altered to allow the switch to connect to another vendor’s equipment via the
DS3 interface.
The configuration of the DS3 interface can be changed with the command:
SET DS3=instance [CLOCK={LOOP|INTERNAL}] [CMTCE={ON|OFF}]
The CLOCK parameter specifies the clock source for the DS3 interface. The
default is LOOP timing where the clock is derived from the received DS3
signal. If INTERNAL is selected the DS3 transmit signal is timed using an
internal clock.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
The CMTCE parameter specifies whether the terminal-to-terminal
path-maintenance link is switched on. When CMTCE is set to OFF the
maintenance link is switched off and the C-bits in M-subframe 5 are all set to
one. If CMTCE is set to ON the maintenance link is switched on. The path
Page 26
26Patch Release Note
maintenance link allows a number of identification messages to be inserted in
to the path overhead of the DS3 signal. These messages are in the form of text
characters and allow the users at either end of the DS3 path to ensure that the
correct DS3 signal has reached their equipment.
The DIRECTION parameter is used with the EIC, FAC, FIC, LIC or UNIT
parameters to specify whether the text string is the text to transmit, or the text
to expect in the received signal. If TRANSMIT is specified, the user is
specifying a text to be transmitted out on the path. If RECEIVE is specified, the
user is specifying the ASCII characters expected on the incoming path. If the
DIRECTION parameter is present the TYPE parameter must also be present.
The EIC parameter specifies the Equipment Identification Code. This is 0 to 10
characters in length and describes the equipment at the near end, e.g. “RAPIER
SW”. This parameter is only meaningful with the CMTCE parameter set to ON.
With CMTCE set to OFF this parameter is ignored. The defaul t pattern is
“ignore”.
The FAC parameter specifies the FACility identification code. This is 0 to 38
characters in length and describes the DS3 path.
This data element is called FI in the ANSI specification, it is named FAC in this
document to avoid confusion with the FIC parameter.
The FAC parameter is only valid if the TYPE parameter is set to PID. This
parameter is only meaningful with the CMTCE parameter set to ON. With
CMTCE set to OFF this parameter is ignored. The default pattern is “ignore”.
The FDET parameter specifies whether fast detection of AIS is enabled. If ON is
specified, the AIS detection time is 2.23ms. If OFF is specified, the AIS
detection time is 13.5ms. The default is ON.
The FIC parameter specifies the Frame Identification Code. This is 0 to 10
characters in length and describes where the equipment is located within a
building, e.g. “FRAME 255”. This parameter is only meaningful with the
CMTCE parameter set to ON. With CMTCE set to OFF this parameter is
ignored. The default pattern is “ignore”.
The GENNO parameter specifies the test signal identification message. It is 0 to
38 characters in length and describes the signal generator that initiates a test
message. This parameter is only valid if the TYPE parameter is set to ISIS. This
parameter is only meaningful with the CMTCE parameter set to ON. With
CMTCE set to OFF this parameter is ignored. The default pattern is “ignore”.
The LIC parameter specifies the Location Identifier Code. This is 0 to 11
characters in length and describes the specific location of the equipment, e.g.
“BUILDING 1”. This parameter is only meaningful with the CMTCE
parameter set to ON. With CMTCE set to OFF this parameter is ignored. The
default pattern is “ignore”.
The PARAM15 parameter specifies the 15-minute counter threshold for all
performance monitoring parameters (PES, PSES, SEF, UAS, LES, CES, CSES)
between 1 and 900 seconds inclusive. If a trigger has been created, it will assert
if the 24-hour count exceeds the value specified in PARAM15. The default is
900 seconds.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 27
Patch 86241-06 For Rapier Switches27
The PARAM24 parameter specifies the 24-hour counter threshold for all
performance monitoring parameters (PES, PSES, SEF, UAS, LES, CES, CSES)
between 1 and 65535 seconds inclusive. If a trigger has been created, it will
assert if the 24-hour count exceeds the value specified in PARAM24. The
default is 65535 seconds.
The PORT parameter specifies fr om which port a test signal is generated, and is
0 to 38 characters in length. This parameter is only valid if the TYPE parameter
is set to TSID. This parameter is only meaningful with the CMTCE parameter
set to ON. With CMTCE set to OFF this parameter is ignored. The default
pattern is “ignore”.
The PRIM15 parameter specifies the 15-minute counter threshold for all
performance monitoring primitives (LCV, PCV, CCV) between 1 and 16383
seconds inclusive. If a trigger has been created, it will assert if the 15-minute
count exceeds the value specified in PRIM15. The default is 16383.
The PRIM24 parameter specifies the 24-hour counter threshold for all
performance monitoring primitives (LCV, PCV, CCV) between 1 and 1048575
seconds inclusive. If a trigger has been created, it will assert if the 24-hour
count exceeds the value specified in PRIM24. The default is 1048575.
The PRIM24 parameter specifies the 24-hour counter threshold for all
performance monitoring primitives (LCV, PCV, CCV) between 0 and 1048575
seconds. If a trigger has been created, it will as sert if the 24 -hour count exceeds
the value specified in PRIM24. The default is 1048575.
The TYPE parameter is used with the EIC, FAC, FIC, LIC, or UNIT parameters
to specify whether the text string is used to describes a path sig nal, an idle
signal, or a test signal.
The UNIT parameter specifies where the equipment is located within a bay e.g.
“SHELF6”, and is 0 to 6 characters in length. This parameter is only meaningful
with the CMTCE parameter set to ON. With CMTCE set to OFF this parameter
is ignored. The default pattern is “ignore”.
To see the current configuration use the command:
SHOW DS3=n STATE
The DS3 counters can be displayed by using the command:
SHOW DS3=n COUNTERS [HISTORY[=interval]] {NEAR|FAR|BOTH}
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
where:
■instance is the number of the DS3 interface.
A further description of DS3 can be found in the DS3 Interfaces section of
Chapter 5, Interfaces in your switch’s software reference.
The commands used to set up and configure the DS3 interface are:
■DISABLE DS3 DEBUG
■DISABLE DS3 TEST
■ENABLE DS3 DEBUG
Page 28
28Patch Release Note
■ENABLE DS3 TEST
■RESET DS3
■RESET DS3 COUNTERS
■SET DS3
■SHOW DS3 CMTCE
■SHOW DS3 CONFIGURATION
■SHOW DS3 COUNTERS
■SHOW DS3 DEBUG
■SHOW DS3 STATE
■SHOW DS3 TEST
Once the interface is set up and configured, it can be used in conjunction with
Frame Relay, using the following commands:
■CREATE FRAMERELAY
■SHOW FRAMERELAY
See Chapter 5, Frame Relay in your switch’s Software Reference.
DS3 interfaces can be tested with the test facility, using the following
commands:
■DISABLE TEST INTERFACE
■ENABLE TEST INTERFACE
■SHOW TEST
See Chapter 7, Test Facility in your switch’s Software Reference.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 29
Patch 86241-06 For Rapier Switches29
Dynamic Port Security
Dynamic Port Security allows for dynamic MAC address learning on a switch
port. If a MAC address is unused for a period of time, it will be aged from the
database of currently accepted MAC addresses. This allows the learning of
new MAC addresses, which is useful because port security allows the number
of devices that are connected to a particular switch port to be limited.
MAC address learning can be set to static or dynamic by using the RELEARN
parameter in the following command:
SET SWITCH PORT={port-list|ALL} [ACCEPTABLE={ALL|VLAN}]
The RELEARN parameter determines whether dynamic or static MAC address
learning will be used on this port. This parameter has no effect if the security
feature limiting the number of MAC addresses is disabled (i.e . when LEARN=0
or NONE).
If the RELEARN parameter is set to OFF, static MAC address learning is used.
Once a MAC address has been learned it will remain permanently in the
learning database. IF the RELEARN parameter is set to ON, dynamic MAC
address learning is used. If a MAC address is unused for a period of time, it
will be removed from the learning database. Another (or the same) MAC
address can then be learned and stored in the vacant position in the learning
database. When RELEARN is enabled on a port, all existing entries in the
learning database are removed. The elapsed time before a MAC address entry
is removed can be set using the SET SWITCH AGEINGTIMER command (See
the Switch Chapter for more information). The default is OFF.
To see whether the sw itch is using static or dynamic port security, use the
command:
SHOW SWITCH PORT[={port-list|ALL}]
This command displays general information about the specified switch ports
or all switch ports.
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Page 30
30Patch Release Note
Figure 1-7: Example output from the SHOW SWITCH PORT command showing the RELEARN parameter.
Table 1-1: New parameter in the output of the SHOW SWIT CH PORT
command.
ParameterMeaning
RelearnWhether
OFF”.
or not MAC address learning is used, one of “ON or
Availability
Patches can be downloaded from the Software Updates area of the Allied
Telesyn web site at www.alliedtelesyn.co.nz/support/updates/patches.html
licence or password is not required to use a patch.
. A
Patch 86241-05 for Software Release 2.4.1
C613-10340-00 REV E
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.