Patch 86231-10
For Rapier Switches and AR800 Series
Modular Switching Routers
Introduction
This patch release note lists the issues addressed and enhancements made in
patch 86231-10 for Software Release 2.3.1 on existing models of Rapier L3
managed switches and AR800 Series L3 modular switching routers. Patch file
details are listed in Table 1.
Table 1: Patch file details for Patch 86231-10.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
This release note should be read in conjunction with the following documents:
■Release Note: Software Release 2.3.1 for Rapier Switches, AR300 and
AR700 Series Routers, and AR800 Series Modular Switching Routers
(Document Number C613-10325-00 Rev B) available from
■Rapier Switch Documentation Set for Software Release 2.3.1 available on
the Documentation and Tools CD-ROM packaged with your switch, or
from www.alliedtelesyn.co.nz/documentation/documentation.html
WARNING: Using a patch for a different model or software release may cause
unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a
commitment on the part of Allied Telesyn International. While every effort has
been made to ensure that the information contained within this document and
the features and changes described are accurate, Allied Telesyn International
can not accept any type of liability for errors in, or omissions arising from the
use of this information.
86s-231.rez
07-May-2003
86231-10.paz
419216 bytes
.
.
Simply connecting the world
Page 2
2Patch Release Note
Some of the issues addressed in this Release Note include a level number. This
number reflects the importance of the issue that has been resolved. The levels
are:
Level 1This issue will cause significant interruption to network services, and
there is no work-around.
Level 2This issue will cause interruption to network service, however there
is a work-around.
Level 3This issue will seldom appear, and will cause minor inconvenience.
Level 4This issue represents a cosmetic change and does not affect network
operation.
Features in 86231-10
Patch 86231-10 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 02158Module: FIREWALLNetwork affecting: No
When a TCP RST/ACK was received by a firewall interface, the packet that
was passed to the other side of the firewall lost the ACK flag, and had an
incorrect ACK number. This issue has been resolved.
PCR: 02166Module: FIREWALLNetwork affecting: No
Locally generated ICMP packets, such as unreachable messages, were not
passed out through public interfaces when the packet that caused the
message was not recorded by the firewall. This may occur, for example, if
the packet passed between two public interfaces. This issue has been
resolved.
PCR: 02356Module: FIREWALLNetwork affecting: No
Previously the SET FIREWALL POLICY RULE command permitted the use
of the GBLIP and GBLPORT parameters in ways that were not permitted by
the ADD FIREWALL POLICY RULE command. This caused problems
when a configuration file was generated because some of the illegal
parameters from the SET command were put into the ADD command. This
resulted in a configuration that contained illegal parameter combinations.
The restrictions placed on the GBLIP and GBLPORT parameters in the ADD
command have now been implemented in the SET command so that these
problems do not occur.
PCR: 02371Module: FIREWALLNetwork affecting: No
When the system time was set to a time that was before or significantly after
the current time, Firewall sessions were prematurely deleted. This issue has
been resolved.
PCR: 02399Module: TRACENetwork affecting: No
The Trace utility has been modified. Previously, Trace sent a group of
packets at once and waited for multiple responses in order to assess the
minimum, maximum and average time to cover a certain "hop distance"
towards the target host. Now Trace sends each packet in each group
individually, and waits either for a response or a time-out before sending
the next packet in the group.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 3
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers3
PCR: 02550Module: FIREWALLNetwork affecting: No
The standard subnet NAT rules on a private interface were not matching a
packet unless its source IP address was exactly the same as the IPADDRESS
value set for the rule, that is the NAT mask value was not being used. This
issue has been resolved.
PCR: 02579Module: FIREWALLNetwork affecting: No
The ADD FIREWALL POLICY and SET FIREWALL POLICY commands
did not generate a valid port list when the optional PORT parameter was set
to ALL. This issue has been resolved.
PCR: 02587Module: OSPFNetwork affecting: No
When OSPF was enabled on startup, an OSPF interface would sometimes
stay in the DOWN state. This issue has been resolved.
PCR: 03009Module: CORE Level: 2
The size of the 86231 patch file was causing issues. This has been resolved.
PCR: 03013Module: INSTALLNetwork affecting: No
The SET INSTALL command was generating an unwanted warning
message on the Rapier i series switches. This issue has been resolved.
PCR: 03015Module: SWINetwork affecting: No
When ports were added to a trunk group on a Rapier 16, the ports operated
in the wrong duplex mode. This issue has been resolved.
PCR: 03026Module: IPGNetwork affecting: No
After setting the IGMP query timer with the SET IP IGMP command, and
saving the configuration, the IGMP Other Querier timeout was not set to the
correct value after a restart. This issue has been resolved.
PCR: 03027Module: DHCPNetwork affecting: No
Entries in the process of being reclaimed as static entries (and waiting for
the remote IP to become routable), were disrupting the reclaim process. This
prevented further entries from being reclaimed. DHCP static entries are
now fully subject to normal reclaim processing.
PCR: 03040Module: IPGNetwork affecting: No
Sometimes IP flows were not deleted correctly when both directions of the
flow were in use. This issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 03042Module: PIM Level: 3
PIM join messages were being sent by a switch connected to an upstream
and a downstream switch or router in the same VLAN when a multicast
group had no members. This issue has been resolved.
PCR: 03065Module: SWI Level: 2
When the TX cable was unplugged from a fibre port the operating status
was incorrectly reported as UP. This issue has been resolved.
Page 4
4Patch Release Note
PCR: 03080Module: DVMRP
DVMRP was not updating the downstream forwarding state correctly. This
issue has been resolved.
PCR: 03109Module: LOG Level: 3
A log was only partially created if there was insufficient NVS memory for
log creation on the router. A change has been made so that a log is not
created if there is insufficient memory, and a warning message is displayed.
PCR: 03111Module: FIREWALL Level: 1
TCP sessions could fail if the public side of the firewall was using Kerberos
and the private side had a very slow connection to the firewall. This issue
has been resolved.
PCR: 03122Module: SWI Level: 2
When a static ARP was added to a trunk group, a software restart could
occur. This issue has been resolved.
PCR: 03134Module: TCP Level: 2
When using the SET TELNET LISTENPORT command, a fatal error
sometimes occurred. This issue has been resolved.
PCR: 03145Module: IPG Level: 4
The SET IP ROUTE FILTER command was not processing some parameters.
This issue has been resolved.
PCR: 03152Module: IPG Level: 3
An additional check has been added to validate the MASK specified in an
ADD IP ROUTE command. The check tests that the mask is contiguous.
PCR: 03159Module: SWI Level: 2
Switch trunk speed checks only checked for gigabit settings, not speed
capabilities. It is now possible for uplink modules which support 10, 000
and gigabit speed to attach to trunks where speeds are 10Mb/s or 100Mb/s.
PCR: 03160Module: STP Level: 2
Executing the PURGE STP command caused fatal error. This issue has been
resolved.
PCR: 03171Module: DVMRP, IPG Level: 3
DVMRP was erroneously forwarding packets to a VLAN with a
downstream neighbour. This issue has been resolved.
PCR: 03173Module: CORE, NTP Level: 3
The default NTP polling interval was set to 64 seconds, not the correct
interval of 128 seconds. This issue has been resolved.
PCR: 03180Module: IPG Level: 3
If all 32 VLAN interfaces had IP addresses attached, only 31 VLANs could
be multihomed. Now all 32 VLAN interfaces with IP addresses can be
multihomed.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 5
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers5
PCR: 03217Module: DVMRP Level: 2
If a DVMRP interface was deleted and then added again, DVMRP routes
associated with this interface were not reactivated. This issue has been
resolved.
PCR: 03240Module: OSPF Level: 2
A fatal error occurred when OSPF was under high load. This issue has been
resolved.
PCR: 03241Module: FIREWALL Level: 2
When deleting a list associated with a policy, all rules were being deleted.
Now only the rules associated with the policy and list are deleted.
PCR: 03250Module: SWI Level: 4
The DELETE SWITCH FILTER command did not work properly when the
ENTRY parameter was assigned a range with hyphen (“-”). This issue has
been resolved.
PCR: 03255Module: FIREWALL Level: 3
The firewall doubled the IPSPOOF event timeout from 2 minutes to 4
minutes. This issue has been resolved.
PCR: 03296Module: IPG Level: 2
Broadcast TCP packets were being processed by the device, causing fatal
errors when firewall SMTP Proxy was configured. Non-unicast TCP packets
are now dropped by IP.
PCR: 03297Module: PIM Level: 2
The Designated Router (DR) of the PIM interface was not resetting when the
RESET PIM INTERFACE command was executed. This issue has been
resolved.
PCR: 03301Module: IPG Level: 3
Packets processed by the firewall were not having their TTL decremented.
This issue has been resolved.
PCR: 03303Module: PIM Level: 3
The PIM Designated Router (DR) is now elected over an entire VLAN
interface, rather than on a per-port basis.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 03333Module: IPG Level: 3
After VRRP was enabled, the link status of the switch ports was shown as
UP, even if there was no connection to the ports. This issue has been
resolved.
PCR: 03336Module: CORE Level: 4
“AT-A42” was being incorrectly displayed as “AT-A42X-00” in the output
of the SHOW SYSTEM command. This issue has been resolved.
Page 6
6Patch Release Note
PCR: 03346Module: SNMP Level: 4
Sometimes the Agent Address field in SNMP traps was not the same as the
IP source address. This meant that sometimes the NMS did not send an
alarm to the network manager when traps were received from switches.
This issue has been resolved.
PCR: 03348Module: SWI Level: 3
The Uplink card sometimes unnecessarily changed its status from UP to
DOWN. This issue has been resolved.
PCR: 03353Module: PPP Level: 3
Dynamic interface details were added through the SET INTERFACE
command when the CREATE CONFIGURATION command was executed.
This caused errors on startup. This issue has been resolved.
PCR: 03360Module: STP Level: 4
Typing “?” after SET STP=stp-name at the CLI to request context-sensitive
Help only returned the PORT and DEFAULT options. This issue has been
resolved so that all options are shown.
PCR: 03378Module: DHCP Level: 2
DHCP sometimes suffered a fatal error when a range of IP addresses was
destroyed. This issue has been resolved.
PCR: 03385Module: FILE, INSTALL, SCR Level:
Critical files (prefer.ins, config.ins and enabled.sec) are now copied from NVS
to FLASH at boot time if they do not exist in FLASH, or if the NVS version
of the file is different from the FLASH version.
PCR: 03386Module: SWI Level: 2
If the SET SWITCH L3FILTER MATCH command had nothing specified for
the IMPORT and EMPORT parameters, and there was an existing match
entry in the filter table, the new filter was not added correctly. Filter match
entries are now accepted regardless of the order in which they are entered
into the table.
PCR: 03402Module: IPG Level: 2
IP routes deleted from the route cache occasionally caused a fatal error. This
issue has been resolved.
PCR: 03416Module: SWI Level: 3
Previously, the ADD SWITCH L3FILTER MATCH command was accepted
if the TYPE parameter was not specified. This command now requires the
TYPE parameter, and an error message will be returned if the TYPE
parameter is not specified.
PCR: 03417Module: PPP Level: 3
The ENABLE PPP DEBUG command was not accepting the ASYN
parameter. This issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 7
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers7
PCR: 03422Module: PIM Level: 2
When forwarding a multicast packet to a downstream neighbour, the device
sometimes forwarded two copies of the packet instead of one. This issue has
been resolved.
PCR: 03432Module: STP Level: 2
STP settings were not retained when a port was deleted from the VLAN that
the STP belongs to. This issue has been resolved.
PCR: 03457Module: OSPF Level: 2
Disabling OSPF caused a fatal error if there was a large routing table. This
issue has been resolved.
PCR: 03458Module: IPG Level: 3
The route information for ipRouteEntry of ipGroup in the MIB-II MIB was not
correct. This issue has been resolved.
PCR: 03465Module: DHCP Level: 2
The IPMTU parameter in the ADD DHCP POLICY command was
accepting values in the range 0-4294967295. This parameter now accepts
values in the correct range of 579-65535.
PCR: 03486Module: SWI Level: 2
Occasionally the switch did not forward packets between two VLANs. This
issue has been resolved.
Features in 86231-09
Patch file details are listed in Table 2:
Table 2: Patch file details for Patch 86231-09.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
24-Dec-2002
86231-09.paz
906911 bytes
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Patch 86231-09 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 02023Module: PIM, VLANNetwork affecting: No
When a VLAN port’s layout chang ed, PIM was not updating correctly. N ow
PIM correctly updates a VLAN port’s interface, neighbour and routes.
PCR: 02171Module: STP, SWITCH, VLANNetwork affecting: No
STP now operates on ports within a trunk group.
Page 8
8Patch Release Note
PCR: 02241Module: FIREWALLNetwork affecting: No
Firewall subnet NAT rules were not working correctly from the private to
the public side of the firewall. Traffic from the public to private side
(destined for subnet NAT) was discarded. These issues have been resolved.
ICMP traffic no longer causes a RADIUS lookup for access authentication,
but is now checked by ICMP handlers for attacks and eligibility. If the ICMP
traffic matches a NAT rule, NAT will occur on inbound and outbound
traffic. HTTP 1.0 requests sometimes caused the firewall HTTP proxy to
close prematurely. Cached TCP sessions were sometimes not hit correctly.
These issues have been resolved.
PCR: 02300Module: FirewallNetwork affecting: No
If the command ADD FIREWALL POLICY RULE SOURCEPORT=ALL was
executed, a value of “65535” was incorrectly displayed for the
SOURCEPORT parameter for that rule in the SHOW FIREWALL POLICY
command. This issue has been resolved.
PCR: 02376Module: PPPNetwork affecting: No
When the PPP ONLINELIMIT was exceeded for PPP over TDM, the PPP
link stayed open, allowing Link Quality Report (LQR) packets to be
transmitted. This caused the ifOutOctets counter to increment. Now, if the
ONLINELIMIT is exceeded, the link will close.
PCR: 02395Module: VRRP, TRGNetwork affecting: No
The SHOW VRRP command now shows the number of trigger activations
for the Upmaster and Downmaster triggers.
PCR: 02396Module: DHCPNetwork affecting: No
DHCP RENEW request messages are now unicast (as defined in the RFC),
not broadcast.
PCR: 02400Module:
Network affecting: No
CORE,FFS,FILE,INSTALL,SCR
If a problem occurred with NVS, some critical files were lost. As a result, the
equipment was forced to load only boot ROM software at boot time. This
patch combined with the new version of the boot ROM software (pr1-1.2.0
for the AR700 series) resolves this issue.
PCR 02408Module: SWINetwork affecting: No
The EPORT parameter in the SHOW SWITCH L3FILTER ENTRY command
was displaying incorrectly after an issue was resolved in PCR02374. The
command now displays correctly.
PCR: 02427Module: DHCPNetwork affecting: No
DHCP entry reclaim checks are now delayed by 10 seconds if the entry is
unroutable because the interface is not up.
PCR: 02463Module: DVMRP, IPGNetwork affecting: No
Support for multi-homed interfaces has been added.
PCR 02465Module: TTYNetwork affecting: No
Under some circumstances a fatal error occurred if a large amount of data
was pasted onto the command line. This issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 9
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers9
PCR: 02489Module: SWINetwork affecting: No
When the switch was under heavy learning load, some MAC address were
lost. This issue has been resolved.
PCR: 02499Module: IPGNetwork affecting: No
Some parameters in the SET IP IGMP command had incorrect ranges. This
issue has been resolved. The correct ranges are:
The ADD IP ROUTE FILTER optional parameter INTERFACE caused the
filter to not work on the OSPF external lsas’ flooding.
The SHOW IP ROUTE FILTER interface name output was truncated to 6
characters. These issues have been resolved.
PCR: 02509Module: DVMRPNetwork affecting: No
The source net mask has been removed from DVMRP prune, graft and
graft-ack messages.
PCR: 02526Module: DVMRPNetwork affecting: No
Under some circumstances, multiple default routes were created for
DVMRP. This issue has been resolved.
PCR: 02532Module: FIREWALLNetwork affecting: No
The Firewall showed the wrong counters on Total Received Packets and
Dropped Packets and displayed twice the number of received packets
when discarding packets from the public side. Also, when a Deny rule was
applied to the private side, the Number of Dropped Packets was always
zero. These issues have been resolved.
PCR: 02537Module: L2TPNetwork affecting: No
When PPP was used over an L2TP tunnel, a speed of zero was shown for
the PPP interface on the LNS side, while the LAC side showed a non-zero
PPP interface speed. This issue has been resolved so that the LNS side of
the PPP interface shows the correct speed.
PCR: 02538Module: DVMRPNetwork affecting: No
The source mask is now always 0xffffffff in the DVMRP forwarding table.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
The temporary route in the DVMRP route table was not displaying
correctly. This issue has been resolved.
An IGMP entry was erroneously added for the reserved IP address. This
issue has been resolved.
PCR: 02545Module: IPGNetwork affecting: No
Previously, it was possible to add up to 33 IP interfaces. The correct limit is
32 IP interfaces. This issue has been resolved.
PCR: 02547Module: IPGNetwork affecting: No
The ARP transmit counter total was not being incremented. This issue has
been resolved.
Page 10
10Patch Release Note
PCR: 02552Module: SWINetwork affecting: No
If ingress filtering was supported within trunk groups, ports with ingress
filtering enabled were erroneously added to the trunk group. This issue has
been resolved.
PCR: 02574Module: DVMRPNetwork affecting: No
Some change actions, and the resending of prune messages were not
operating correctly. This issue has been resolved.
Features in 86231-08
Patch file details are listed in Table 3:
Table 3: Patch file details for Patch 86231-08.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
11-Oct-2002
86231-08.paz
371680 bytes
Patch 86231-08 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 02236Module: FIREWALLNetwork affecting: No
Sometimes the retransmission of an FTP packet was not permitted through
the Firewall. This issue has been resolved.
PCR: 02324Module: SWINetwork affecting: No
It is now possible to create 16 Layer 3 filters on Rapier i Series switches.
PCR: 02327Module: IPG/FIREWALLNetwork affecting: No
In some situations, multihomed interfaces caused the Firewall to apply
NAT and rules incorrectly when packets were received from a subnet that
was not attached to the receiving interface. This issue has been resolved.
PCR: 02329Module: DHCPNetwork affecting: No
An ARP entry for a host has been removed whenever a DHCP DISCOVER
or DHCP REQUEST message is received from the host. This allows for
clients changing ports on a switch.
PCR: 02332Module: IPSECNetwork affecting: No
The sequence number extracted from the AH and ESP header was in the
wrong endian mode, which caused an FTP error with IPSEC anti-replay.
This issue has been resolved.
PCR: 02340Module: IPGNetwork affecting: No
If PIM is enabled, and the RESET IP INTERFACE command is executed,
PIM is disabled. PIM now restarts automatically if this happens.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 11
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers11
PCR: 02343Module: PPPNetwork affecting: No
When acting as a PPPoE Access Concentrator (AC), if a PPPoE client sent
discovery packets without the "host-unique" tag, the discovery packets sent
by the AC were corrupted. This issue has been resolved.
PCR: 02359Module: IPGNetwork affecting: No
When an IP Multihomed interface was used as an OSPF interface,
neighbour relationships were only established if the IP interface for OSPF
was added first in the configuration. Now, OSPF establishes neighbour
relationships regardless of the IP Multihomed interface configuration order.
PCR: 02360Module: DHCPNetwork affecting: No
This patch implements simple DHCP range MIBs,
dhcpRangeExhaustedGateway and dhcpRangeExhaustedInterface, and a trap
that shows when a DHCP range was exhausted. The trap is triggered when
a DHCP request cannot be satisfied. The gateway address and the interface
address are returned as trap variables.
PCR: 02362Module: PIMNetwork affecting: No
If the HELLOINTERVAL parameter in the SET PIM command was less than
4 seconds, the PIM neighbour would time out. The minimum
HELLOINTERVAL has been changed to 10 seconds for this command. Also,
the commands SET IP INTERFACE and SET PIM INTERFACE were not
recognising a modified IP address. The RESET PIM INTERFACE=VLAN
command was not working correctly. These issues have been resolved.
PCR: 02364Module: FFSNetwork affecting: No
The Flash compaction message has been changed from:
Flash compacting...
DO NOT restart the router until compaction is completed
To:
Flash compacting...
DO NOT restart the router, or power down until compaction is completed
PCR: 02365Module: SWINetwork affecting: No
Address learning on the mirror port is now correctly re-enabled when it is
restored to its normal state.
PCR: 02366Module: SWINetwork affecting: No
If a gigabit fibre uplink was installed in a Rapier 24i or Rapier 48i, and the
receive fibre was slowly withdrawn while the uplink was receiving heavy
traffic, the switch chip sometimes locked up. This patch implements a
workaround by causing a warm restart if this situation arises. A message is
then written to the log to explain the cause of the restart.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02368Module: IPG/IGMPNetwork affecting: No
IGMP failed to create an automatic IGMP membership with no joining port
when it received multicast data that no ports were interested in, when IP
TimeToLive was set to 1 second. Also, IGMP erroneously sent a query on an
IGMP enabled IP interface even when IGMP was disabled. These issues
have been resolved.
Page 12
12Patch Release Note
PCR: 02374Module: SWINetwork affecting: No
In the ADD SWITCH L3FILTER command, the EPORT parameter
incorrectly accepted the value 62-63 as multicast and broadcast ports 63-64.
This issue has been resolved.
PCR: 02397Module: DVMRPNetwork affecting: No
After a prune lifetime had expired, the interface was not joined back to the
DVMRP multicast delivery tree. This issue has been resolved.
Features in 86231-07
Patch file details are listed in Table 4:
Table 4: Patch file details for Patch 86231-07.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
6-Sep-2002
86231-07.paz
355652 bytes
Patch 86231-07 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 01285Module: OSPFNetwork affecting: No
When an interface went down (or was disabled) on an AS border router, the
external routes were not removed from the routing domain. Such routes are
now removed by premature aging.
PCR: 02003Module: FIREWALLNetwork affecting: No
The timeout value for ICMP session entries in the firewall can now be
adjusted via the OTHERTIMEOUT parameter of the SET FIRE POLICY
command. Note: if the value for OTHERTIMEOUT is set to more than 10
minutes the timeout used for ICMP sessions will default to 10 minutes.
PCR: 02032Module: VLANNetwork affecting: No
An additional enhancement has been added for this previously released
PCR. Now ifOutOctets increments correctly in the VLAN interface MIB.
PCR: 02036Module: SWITCHNetwork affecting: No
A new command allows the Layer 3 aging timer to be changed:
SET SWITCH L3AGEINGTIMER=<seconds>
where seconds can be 30 - 43200. After each cycle of the ageing timer, all
existing Layer 3 entries with the hit bit set will have the hit bit reset to zero,
and all existing Layer 3 entries with the hit bit set to zero will be deleted.
The SHOW SWITCH command output now displays the Layer 3 ageing
timer value.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 13
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers13
PCR: 02083Module: OGM/GUINetwork affecting: No
The following additional enhancements have been added to this previously
released PCR:
•The Set STP page now correctly displays the Bridge Priority, and not the
root.
•The Priority field in the Add STP and Set STP pages now accepts five
characters instead of four.
•The STP Monitoring page now displays the correct ports in the STP.
•The STP pages now lock correctly when no ports are selected.
PCR: 02102Module: DVMRPNetwork affecting: No
DVMRP hold-down routing was not working correctly. This issue has been
resolved.
PCR: 02111Module: BGPNetwork affecting: No
Executing the RESET IP command left BGP peers in the DISABLED state.
BGP was not aware when an IP interface changed state and consequently
BGP got out of syncronisation with IPG. Multiple IP Routemap entries
failed if the first entry had a different match type to the following entries.
BGP peer update transmission was not operating correctly. A BGP peer that
was in the ESTABLISHED state would still try to make TCP connections to
its peer. These issues have been resolved.
PCR: 02128Module: FIREWALLNetwork affecting: No
Some FTP packets handled by the firewall were forwarded with incorrect
sequence numbers, causing FTP sessions to fail. This issue has been
resolved.
PCR: 02150Module: CORE, SNMPNetwork affecting: No
When passing 64-bit counters in an SNMP packet, only the lower 32 bits
were passed. Now the full 64 bits of the counter will be returned if all are
required.
PCR 02151Module: IPGNetwork affecting: No
The Rapier was not detecting invalid checksums in ICMP echo request
packets. This issue has been resolved. ICMP echo request packets with
invalid checksums are now dropped and the ICMP inErrors and inDiscards
counters are incremented.
PCR: 02167Module: FIREWALLNetwork affecting: No
Locally generated ICMP messages, that were passed out through a firewall
interface because they were associated with another packet flow, had their
source address changed to that of the associated packet flow and were also
forwarded with incorrect IP checksums. This only occurred when there was
no NAT associated with the packet flow. This issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR 02172Module: IPGNetwork affecting: No
The TOS field in IP packets was not being processed by IP POLICY filters
with an identifier greater than 7. This issue has been resolved.
Page 14
14Patch Release Note
PCR: 02174Module: FIREWALLNetwork affecting: No
A feature has been added that makes pings pass from the source IP address
of the public interface to the IP address on the private interface in the
firewall.
PCR 02176Module: FIREWALLNetwork affecting: No
Packets traversing in and out of the same public firewall interface were
sometimes blocked. The firewall should only control packets passing
between a public and a private interface. This issue has been resolved.
PCR 02178Module: HTTPNetwork affecting: No
A buffer leak was associated with the HTTP server. This issue has been
resolved.
PCR 02180Module: IPGNetwork affecting: No
Multicast counters were not incrementing correctly. This issue has been
resolved.
PCR 02184Module: FFS FILE TTYNetwork affecting: No
This patch supersedes PCRs 02073, 02081, 02086 and 02105. In addition to
enhancements in the preceding PCRs, this PCR now also resolves the
following issues:
•If a compaction was started within 60ms of a file write commencing, the
file being written was placed in the wrong location in the file system.
This led to file corruption during subsequent compactions.
•If a file load occurred during compaction, an incomplete copy of the file
was loaded. The load also put the file into the wrong part of the file
system once the compaction had moved beyond the part of the file that
had been loaded.
•A fatal error occurred during compaction if a file was marked as deleted
when it was being transferred.
•Sometimes during compaction when the file system was erasing blocks
belonging to deleted files, one of the files was transferred rather than
deleted. However, its directory entry was deleted, so the file was not
visible with a SHOW FILE command but was visible with a SHOW
FFILE command.
•During compaction if the amount of free space was less than two erase
blocks (including the "spare" erase block), the file system erroneously
reported that a large amount of space was available for a new file due
to an underflow problem. When a new file was written it would corrupt
existing data.
•If the file system was completely full and the deletion of a single file led
to a compaction, the file system reported that it was continually
compacting. This was because it was repeatedly searching through a
linked list of file headers.
•A byte of data from FLASH was incorrectly returning the value 0xFF.
•When a file was renamed using upper case letters, the renamed file did
not appear in the file directory but did appear in FLASH. Also, if a
SHOW FFILE CHECK command was executed after renaming the file,
the file system would appear to hang. All file names must now be lower
case.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 15
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers15
•Multiple TTY sessions could edit the same file. This caused
unpredictable behaviour when the TTY sessions closed the files.
A new command, SHOW FFILE VERIFY, has been added. This command
steps through the file system headers starting with file zero and finishing at
the end of the last reachable file. It then verifies that all FLASH locations
from the end of the last reachable file to the beginning of file zero are in an
erased state. Errors are reported as they are found.
PCR: 02185Module: VRRPNetwork affecting: No
The SHOW CONFIG DYNAMIC=VRRP command was not showing port
monitoring and step values correctly. This issue has been resolved.
PCR 02188Module: VRRPNetwork affecting: No
When VRRP responded to an ARP request for the VR IP address it was not
making an entry in the ARP table and the switch L3 table. This issue has
been resolved.
PCR 02194Module: SWINetwork affecting: No
Untagged Layer 2 packets selected for mirroring were incorrectly
transmitted from the mirror port with a tag. This issue has been resolved.
PCR: 02195Module: SWINetwork affecting: No
If a port on a Rapier 48 or Rapier 48i went down, some associated entries
were not promptly removed from the forwarding, Layer 3 and default IP
tables. This issue has been resolved.
PCR: 02198Module: DHCPNetwork affecting: Yes
This PCR includes the following enhancements:
•A new command, SET DHCP EXTENDID allows for multiple DHCP
clients, and handling of arbitrary client IDs on the server.
•Static DHCP entries now return to the correct state when timing out.
•DHCP entry hashes now have memory protection to prevent fatal
errors.
•DHCP client now retransmits XID correctly.
•Lost OFFER messages on the server are now handled correctly.
The DHCP server now correctly handles DHCP clients being moved to a
different interface on the DHCP server after they’ve been allocated an IP
address.
PCR: 02199Module: TRIGGERNetwork affecting: No
The CPU and MEMORY parameters in the SET TRIGGER command
erroneously accepted the minimum value “0” rather than “1”. This issue has
been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02202Module: FIREWALL/IP NATNetwork affecting: No
Previously, when Firewall or IP NAT was enabled, any fragmented IP
packets had to be reassembled so they could be processed. If the fragments
could not be reassembled, the packet was dropped. Reassembly could only
occur if the combined packet (IP header, and protocol header, and data) was
no more than 1800 bytes. An additional limit of no more than eight
fragments was also imposed. This PCR implements enhanced fragment
Page 16
16Patch Release Note
handling for Firewall and IP NAT. Each module can now be configured to
process fragmented packets of specified protocol types without needing to
reassemble the packet. The number of fragments a packet may consist of is
also configurable. This enhanced fragment handling is disabled by default.
To enable enhanced fragmentation for Firewall, use the command:
ENABLE FIREWALL POLICY=policy_name
FRAGMENT={ICMP|UDP|OTHER}
To enable enhanced fragmentation for IP NAT, use the command:
ENABLE IP NAT FRAGMENT={ICMP|UDP|OTHER}
To disable enhanced fragmentation for Firewall, use the command:
DISABLE FIREWALL POLICY=policy_name
FRAGMENT={ICMP|UDP|OTHER}
To disable enhanced fragmentation for IP NAT, use the command
DISABLE IP NAT FRAGMENT={ICMP|UDP|OTHER}
To configure the number of fragments permitted per packet for Firewall, use
the command:
SET FIREWALL FRAGMENT=8...50
To configure the number of fragments permitted per packet for IP NAT, use
the command:
SET IP NAT FRAGMENT=8...50
TCP has been excluded from this enhancement because TCP has the MSS
(Maximum Segment Size) parameter for segment size control. Also, for
PPPoE interfaces with a reduced MTU of 1492, a previous enhancement in
PCR 02097 ensures that TCP MSS values in sessions carried by a PPPoE
interface are clamped to a value that prevents fragmentation.
PCR: 02214Module: IPGNetwork affecting: No
A buffer leak occurred when a large number of flows (over 4000) were in use
and needed to be recycled. This issue has been resolved.
PCR: 02215Module: FILENetwork affecting: No
When the only feature licence in the feature licence file was disabled, the
licence file stored on FLASH memory did not change. This was due to a
previous enhancement in PCR 02184 which prevented existing files being
deleted before a new version was stored. This issue has been resolved.
PCR 02217Module: OSPFNetwork affecting: No
A restriction now applies to the generation of unnecessary OSPF indication
LSAs, originated when a neighbour router does not support OSPF demand
circuits.
PCR: 02220Module: SWINetwork affecting: No
The EPORT parameter in the ADD SWITCH L3FILTER ENTRY and SET
SWITCH L3FILTER ENTRY commands was matching multicast and
broadcast packets with software filtering. This issue has been resolved.
PCR 02222Module: IPGNetwork affecting: No
Packets were incorrectly being switched by hardware when filters were
enabled. Packets are now switched in software if filters are set, and are
switched in hardware if no filters are set.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 17
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers17
PCR: 02229Module: IPGNetwork affecting: No
The PURGE IP command now resets the IP route cache counters to zero.
PCR: 02240Module: SWINetwork affecting: No
The SENDCOS filter action did not operate correctly across switch
instances. This was because the stacklink port on the Rapier 48 did not
correctly compensate for the stack tag on frames received via the filter. This
issue has been resolved.
PCR: 02242Module: IPGNetwork affecting: No
On a Rapier 24, adding an IP interface over a FR interface caused an
ASSERT debug fatal error. This issue has been resolved.
PCR 02244Module: UTILITYNetwork affecting: No
Virtual interfaces were displayed incorrectly when VLANs were
multihomed. This issue has been resolved.
PCR: 02245Module: VRRPNetwork affecting: No
VRRP returned an incorrect MAC address for an ARP request. This issue
has been resolved.
PCR 02248Module: IPSEC, IPGNetwork affecting: No
Fragmented packets with a total length greater than 1800 bytes are handled
using chained packets. IPSEC does not process chained packets and was
discarding them even if the IPSEC policy action was set to PERMIT. This
enhancement allows fragmented packets greater than 1800 bytes to be
passed by the switch when IPSEC is enabled and the action is set to
PERMIT.
PCR: 02250Module: FIREWALLNetwork affecting: No
Sometimes the Firewall erroneously used NAT. This issue has been
resolved.
PCR 02257Module: SWI/VLANNetwork affecting: No
An IGMP multicast storm sometimes occurred on trunked ports. This issue
has been resolved.
PCR: 02259Module: DHCP, IPGNetwork affecting: No
A dual Ethernet router was incorrectly accepting an IP address from a
DHCP server when the offered address was on the same network as the
other Ethernet interface. An error is now recorded when DHCP offers an
address that is in the same subnet as another interface.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02260Module: TTYNetwork affecting: No
When a ‘\n’(LF) character was received, the router/switch did not
recognise this as the termination of a command over Telnet. This issue has
been resolved.
PCR: 02262Module: DNSNetwork affecting: No
Responses to MX record requests were not handled correctly if the preferred
name in the MX record differed from the one that was requested. This issue
has been resolved.
Page 18
18Patch Release Note
PCR: 02263Module: VRRPNetwork affecting: No
The virtual MAC address was used as the source MAC for all packets
forwarded on an interface associated with a Virtual Router (VR). This was
confusing when multiple VRs were defined over the same interface because
only one virtual MAC address was ever used. The other virtual MAC
addresses (for the other VR's) were only used if the source IP address
matched the VR’s IP address. To avoid this confusion, the system MAC
address is now always used unless the source IP address of the packet is the
same as the VR’s IP address.
PCR: 02264Module: PIM, DVMRP, SWINetwork affecting: No
PIM or DVMRP failed to see any data if IGMP snooping was on and
DVMRP or PIM was enabled after the data stream had reached the router/
switch. This issue has been resolved.
PCR: 02268Module: FIREWALLNetwork affecting: No
HTTP requests from a fixed IP address were erroneously reported as a host
scan attack in the Firewall deny queue. This issue has been resolved.
PCR: 02274Module: TPADNetwork affecting: No
ARL message interrupts have been re-enabled after a software table rebuild
to fix synchronisation of the software forwarding database with the
hardware table.
PCR: 02275Module: OSPFNetwork affecting: No
Some routes were not added into the OSPF route list, and therefore were not
added into the IP route table. This issue has been resolved.
PCR: 02276Module: FIREWALLNetwork affecting: No
The CREATE CONFIG command did not save the SOURCEPORT
parameter to the configuration file when the low value of the source port
range was set to zero. This issue has been resolved.
PCR: 02287Module: IPGNetwork affecting: No
Existing IGMP groups were not deleted when IGMP was disabled globally
or on the associated interface. This gave the groups very high timeout
values. This issue has been resolved.
PCR: 02292Module: IPSECNetwork affecting: No
IPSec no longer logs packets that match an ACTION=ALLOW policy. The
overhead of this logging was affecting non-IPSec traffic.
PCR: 02293Module: ENCONetwork affecting: No
The ENCO key creation thread did not suspend to allow other processes
any CPU time. This caused the command prompt to freeze during key
creation. This issue has been resolved.
PCR: 02294Module: IKMPNetwork affecting: No
The LOCALRSAKEY parameter in the CREATE ISAKMP POLICY and SET
ISAKMP POLICY commands was not accepting the value zero. This issue
has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 19
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers19
PCR: 02299Module: VRRPNetwork affecting: No
If a packet with a destination IP address equal to a VRRP IP address was
received when the router didn’t own the IP address, (because it didn’t have
an interface with that IP address) the router incorrectly tried to forward the
packet and send an ICMP “redirect” message to the source. Now, if such a
packet is received, it will be discarded and an ICMP “host unreachable”
message will be sent to the source.
PCR: 02301Module: IPGNetwork affecting: No
If a DNS relay agent was configured with overlapping subnets, sometimes
the DNS server response was returned to the client with a source IP address
of an interface of the relay agent that was different from the interface the
request was received on. This issue has been resolved.
PCR: 02303Module: INSTALLNetwork affecting: No
When enabling or disabling feature licences, a message will now be
generated with a warning that changes to feature licences may not take
effect until after a reboot.
PCR: 02304Module: VRRPNetwork affecting: No
VRRP used the wrong source IP address in ICMP redirects. RFC 2338 states
that the source IP address of ICMP redirects should be the IP address that
the end host used when making its next hop routing decision. In the case of
a packet sent to a VRRP virtual MAC address, this is the primary VRRP IP
address associated with the MAC address, provided such a VR exists and is
in the master state. This issue has been resolved.
PCR: 02305Module: STP, VLANNetwork affecting: No
If IGMP and STP were enabled, and an IGMP packet was received on a STP
blocking port, the packet was forwarded to another port, causing an IGMP
storm. This issue has been resolved.
PCR: 02308Module: SWINetwork affecting: No
This PCR implements fan threshold control, parity enable/disable, A39 link
card enable/disable and Cell Buffer Pool Global Buffer Pool (CBPGBP)
enable/disable.
PCR: 02316Module: CORENetwork affecting: No
Some board names for the Rapier 24i and Rapier 48i were incorrect. This
issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02317Module: IPGNetwork affecting: No
The SIZE functionality on the IP filter was not working for IP fragmented
packets. This issue has been resolved.
PCR: 02319Module: DHCPNetwork affecting: No
DHCP requests for IP addresses on incorrect and unroutable subnets would
fail. The DHCP server now offers an IP address on a valid subnet.
PCR: 02323Module: SWINetwork affecting: No
Layer 3 switch load balancing has been implemented across trunked ports.
Page 20
20Patch Release Note
Features in 86231-06
Patch file details are listed in Table 5:
Table 5: Patch file details for Patch 86231-06.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
17-May-2002
86231-06.paz
199360 bytes
Patch 86231-06 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 01200Module: OSPFNetwork affecting: No
OSPF has been modified to utilise a 0.1s tick, as opposed to a 20ms tick.
PCR 01239Module: IKMP, IPGNetwork affecting: Yes
IKE failed to negotiate with a peer when the negotiation was triggered by
the PRENEGOTIATE parameter of the CREATE ISAKMP POLICY and SET
ISAKMP POLICY commands. This issue has been resolved.
PCR: 01241Module: OSPF, IPGNetwork affecting: No
OSPF performance has been improved by running it as a separate thread.
PCR: 01242Module: CORE, SNMPNetwork affecting: No
The switch now delays sending link traps immediately after a restart to give
the link to the trap host time to come up. A similar change has been made
for the cold start trap. After a 10s delay, all interfaces which are UP have a
link trap generated for them. After that, link traps are sent as normal.
PCR: 01287Module: OSPF, IPGNetwork affecting: No
Configuring IP route filters did not stop flooding of AS external LSAs to
neigbours at startup. The result was that the neigbour received the AS LSAs
and added the corresponding routes into its own routing table. However,
after some time (e.g. 1 hour), the AS external LSAs in the neigbour’s
database disappeared, but the corresponding routes were still in its routing
table. This issue has been resolved.
PCR: 02073Module: FILENetwork affecting: No
If a flash write error occurred when a file was being written, the file’s
directory entry was deleted leaving a partial file in flash. Subsequent
attempts to write the file failed because a file of the same name already
existed. This issue has been resolved.
PCR: 02075Module: OSPF, IPGNetwork affecting: No
In configurations containing a large number of OSPF routes, the SPF
calculation could take a long time. During this calculation, other events
would not be processed. This patch reduces the time required for an SPF
calculation and allows the switch to respond to other events in the mean
time. This patch also improves the performance of flow cache updates.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 21
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers21
PCR: 02081Module: FILE, FFSNetwork affecting: No
If the FILE module was required to re-write a file, the existing file would be
deleted before the size of the new file was known. This issue has been
resolved.
PCR: 02083Module: IPGNetwork affecting: No
The following issues have been resolved:
•The GUI suffered a fatal error when multiple users browsed to singleuser pages.
•It was not possible to modify port settings.
•“Enable” and “disable” GUI handlers were not working correctly.
•Incorrect commands were not dealt with correctly, locking the GUI.
•The layer 3 “modify” buttons were not working correctly.
•“Remove” buttons attempted to operate if no selection was made.
•“Modify” pages did not show any data.
Also, support has been added for the Rapier 16i, 24i and 48i models.
PCR: 02083Module: HTTPNetwork affecting: No
The GUI stopped working when a VLAN’s IP address was changed. This
issue has been resolved.
PCR: 02083Module: SWINetwork affecting: No
The formatting of the GUI-FIELD-LEARNED field for the 0 learned case has
been improved.
PCR: 02083Module: CORENetwork affecting: No
Long system location strings now operate correctly. Also, support has been
added for A40 and A42 uplink cards.
PCR: 02086Module: FFSNetwork affecting: No
If a file ended short of an erase block boundary and a compaction was
started, the block in which the file was stored was not erased, causing errors
when new files were written. Also, if the last file in the filing system ended
on or short of an erase block boundary, and a compaction was started, then
compaction would fail. These issues have been resolved.
PCR: 02105Module: FFSNetwork affecting: No
An error occurred when the FLASH write driver was required to write
values that were not long-word aligned and were at the driver’s page
boundary. The driver attempted to write into the next section of memory. It
also attempted to read the status of this section of memory, and
misinterpreted the result as a low Vpp voltage. Also, errors occurred during
FLASH compaction. These issues have been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02113 Module: SWINetwork affecting: No
When a Rapier with C revision silicon received a multicast packet, the
ifOutError port counter was incorrectly incremented. This issue has been
resolved.
Page 22
22Patch Release Note
PCR: 02116Module: IPG PINGNetwork affecting: No
When pinging to a remote IP address with two or more different cost routes,
if the preferred route became unavailable, the ping failed to switch to the
less preferred route until the ping was stopped and restarted. This issue has
been resolved.
PCR: 02118Module: SWINetwork affecting: No
When the command SH SWI PORT ? was entered, the parameter options
VLAN and SOCK were displayed. They should not have been because they
are not valid parameters for the command. Executing the command with
the SOCK parameter caused a fatal error. These issues have been resolved.
PCR: 02120Module: IPGNetwork affecting: No
When a Rapier was restarted the IP address of the domain name server was
not displayed on the IP General GUI page. This issue has been resolved.
PCR: 02121Module: SWINetwork affecting: No
When an STP instance was enabled for the first time on a Rapier 48, BPDU
transmission on ports 25-48 was delayed for up to 30 seconds. STP BPDUs
are now transmitted as soon as the STP instance is enabled.
PCR: 02123Module: IPGNetwork affecting: No
The IP, MASK, and ACTION parameters could not be set with the SET IP
ROUTE FILTER command. This issue is resolved when the filter number is
specified at the start of the command, for example:
SET IP ROUTE FILTER=filter-id IP=ipadd MASK=ipadd
ACTION={INCLUDE|EXCLUDE}
where: filter-id is the filter number. Filter numbers are displayed in the
output of the SHOW IP ROUTE FILTER command.
PCR: 02130Module: SWINetwork affecting: No
A port that was deleted from a VLAN continued to switch packets, and
entries remained in the ARP and LAYER 3 hardware tables when they
should have been removed. These issues has been resolved.
PCR 02135Module: SSHNetwork affecting: No
Logging out of a Secure Shell session sometimes caused a restart. This issue
has been resolved.
PCR 02136Module: FIREWALLNetwork affecting: No
The firewall was blocking outbound ICMP packets when the associated
private interface had a ‘deny all’ rule. The forwarding of packets is now
controlled by the ICMP_FORWARDING and PING parameters.
PCR 02137Module: ISAKMPNetwork affecting: No
The ISAKMP main and aggressive exchanges could get stuck in the KE sent
state if an SA message was received from the remote device when a KE
message was expected. This issue has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 23
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers23
PCR 02138Module: SWINetwork affecting: No
The built in Self Test Code for all Rapiers, except G6, has been improved to
enhance the detection of faults in switch chip external packet memory.
PCR 02142Module: ISAKMPNetwork affecting: No
The enco key disappeared from the flash after reboot. This issue has been
resolved.
PCR 02144Module: IPGNetwork affecting: No
The IPG module has been enhanced to support gratuitous ARP request and
ARP reply packets.
PCR 02145Module: IPGNetwork affecting: No
The IGMP refresh timer could incorrectly be show a value greater than
4000000000. This issue has been resolved.
PCR 02146Module: SWINetwork affecting: No
The Layer 3 filter was not working on ports 25-48 if the ingress port was
different from the egress port. This issue has been resolved.
PCR 02147Module: SWITCH, VLANNetwork affecting: No
If only one uplink card was present, and it was in the bottom bay of the
Rapier, then the VLAN module would incorrectly register the presence of
an uplink card in the top bay.
PCR 02148Module: ISAKMPNetwork affecting: No
The CREATE CONFIG command no longer outputs the
POLICYFILENAME parameter if the value has not been set.
PCR 02149Module: TTYNetwork affecting: No
SSH clients were unable to logout and caused the system to freeze. Incorrect
logins caused an infinite lockout. These issues have been resolved.
PCR 02151Module: IPGNetwork affecting: No
The Rapier was not detecting invalid checksums in ICMP echo request
packets. This issue has been resolved. ICMP echo request packets with
invalid checksums are now dropped and the ICMP inErrors and inDiscards
counters are incremented.
PCR 02153Module: SWINetwork affecting: No
The following issues have been resolved:
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
•If an A39 port was forced to a fixed 10Mbit or 100Mbit speed, then its
configuration would become MDI when it should have been MDI-X.
•If an A39 port was set to operate in duplex mode, at 1000Mbit, the
output of the SHOW CONFIG DYNAMIC command did not match the
new settings.
Page 24
24Patch Release Note
.
PCR 02160Module: PIMNetwork affecting: No
If PIM DM was configured with multicast switch emulation, and OSPF was
configured and the switch was restarted during the processing of multicast
packets, PIM DM was updated with the correct route information, however,
the MARL table was updated with incorrect information. This caused
packets to be forwarded by software instead of being switched by
hardware, or dropped. This issue has been resolved.
PCR 02161Module: IPGNetwork affecting: No
The IP Filter SIZE parameter was not being applied correctly. This issue has
been resolved.
PCR 02162Module: IPGNetwork affecting: No
The SET IP FILTER command would not update the SIZE parameter
correctly. This issue has been resolved.
PCR 02165Module: IPGNetwork affecting: No
If the IGMP query interval was set to less than 4 seconds, then IGMP query
messages were not sent. This issue has been resolved.
PCR 02169Module: IPGNetwork affecting: No
An issue with multicast code which is used for copying multicast packets
has been resolved.
PCR 02175Module: IPGNetwork affecting: No
Equal cost multipath routing sometimes failed to use equal cost routes in
balance. This issue has been resolved.
Features in 86231-05
Patch file details are listed in Table 6.
Table 6: Patch file details for Patch 86231-05.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
11-Apr-2002
86231-05.paz
140084 bytes
Patch 86231-05 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 01263Module: FIREWALLNetwork affecting: No
The firewall TCP timeout values for sessions in the CLOSED and
TIMEWAIT states have been reduced. This only applies to the stateful
inspection of firewall sessions and not to the TCP module.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 25
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers25
PCR: 01275Module: FIREWALLNetwork affecting: No
The firewall was incorrectly forwarding multicast packets originating from
a private address in cases where a matching route was defined. This issue
has been resolved.
PCR: 02020Module: SWINetwork affecting: No
When disabling port mirroring the VLAN tagging configuration of other
ports was corrupted. This issue has been resolved.
PCR: 02024Module: IPGNetwork affecting: No
Proxy Arp can now be used on VLAN interfaces.
PCR: 02032Module: SWI VLANNetwork affecting: No
A protected VLAN feature has been added. This enables the network
manager to prevent inter-port communication between devices connected
to ports in the same VLAN.
PCR: 02041Module: SWINetwork affecting: No
In some situations, the switch would stop forwarding packets via internal
and/or external uplink ports. This issue has been resolved.
PCR: 02051Module: VRRPNetwork affecting: No
When using VRRP interface monitoring, but not port monitoring, the VRRP
priority could be incorrect. Also, the dynamic priority value rather than the
configured priority value was appearing in router generated
configurations. These issues have been resolved.
PCR: 02052Module: LOADNetwork affecting: No
Uploading a file with TFTP that included a directory name (eg. tftptest/
testfile.txt) caused a fatal error. This issue has been resolved. Also, the
pathname length has been increased from 40 to 100 characters.
PCR: 02054Module: SWI, CORENetwork affecting: No
Support for the A42 GBIC uplink has been added.
PCR: 02057Module: FIREWALLNetwork affecting: No
Firewall TCP timeout values have been reduced for sessions placed in the
CLOSED state after receiving a TCP/RESET. This applies to the stateful
inspection of firewall sessions only, and not to the TCP module. Previously,
PCR 01263 reduced the timeout value for sessions placed in the CLOSED
state after a TCP/FIN packet was received.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02058Module: CORE, SNMPNetwork affecting: No
An SNMP GET-NEXT request for fanAndPsTemperatureStatus.0 returned an
incorrect noSuchName error. Also, instance restart.0 was unreachable
because restartMibTable was not initialised correctly. These issues have been
resolved.
PCR: 02062Module: SWINetwork affecting: No
The Gigabit Maximum frame length has been increased to 1528 bytes to
allow passing of Stacking Link Port frames.
Page 26
26Patch Release Note
PCR: 02063Module: FIREWALLNetwork affecting: No
Firewall IP access lists were not working correctly. If an IP range was
specified without spaces between the IP address and the separating '-' the
range would be ignored. Spaces are no longer required. Also, matches were
made to addresses covered by a range in an access list if the matching range
was numerically the lowest in the list. This issue has been resolved.
PCR: 02066Module: STPNetwork affecting: No
After increasing the switch’s STP priority, the Designated Root information
was not updated. This issue has been resolved.
PCR: 02070Module: CORENetwork affecting: No
The TickTimer ran one percent slower than it should have. This issue has
been resolved.
PCR: 02071Module: NTPNetwork affecting: No
When a NTP packet was received from an NTP server (mode 4) the router
acted as a client, and sent a reply back to the server, but did not remove the
peer association. This meant that the Dynamic Peers list, viewed using the
SHOW NTP command, displayed incorrect dynamic peer associations. This
issue has been resolved.
PCR: 02076Module: SWI, VLANNetwork affecting: No
If ingress bandwidth limiting was set below 1000, ICMP (ping) packets were
no longer passing through the switch. This issue has been resolved. Also, if
packet debugging was enabled, and a packet received on a VLAN was for
another VLAN, the packet was not displayed by debug before it was
dropped. This issue has been resolved.
PCR: 02078Module: IPGNetwork affecting: No
ARP was not completing when an interface was down. This issue has been
resolved.
PCR: 02082Module: OSPFNetwork affecting: Yes
OSPF virtual links running across a single network segment would accept
0.0.0.0 as the next hop address. This was inherited by derivative routes,
making them unusable. This issue has been resolved.
PCR: 02083Module: IPGNetwork affecting: No
The following issues have been resolved:
•The GUI suffered a fatal error when multiple users browsed to singleuser pages.
•It was not possible to modify port settings.
•“Enable” and “disable” GUI handlers were not working correctly.
•Incorrect commands were not dealt with correctly, locking the GUI.
•The layer 3 “modify” buttons were not working correctly.
•“Remove” buttons attempted to operate if no selection was made.
•“Modify” pages did not show any data.
Also, support has been added for the Rapier 16i, 24i and 48i models.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 27
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers27
PCR: 02083Module: HTTPNetwork affecting: No
The GUI stopped working when a VLAN’s IP address was changed. This
issue has been resolved.
PCR: 02083Module: SWINetwork affecting: No
The formatting of the GUI-FIELD-LEARNED field for the 0 learned case has
been improved.
PCR: 02083Module: CORENetwork affecting: No
Long system location strings now operate correctly. Also, support has been
added for A40 and A42 uplink cards.
PCR: 02084Module: FIREWALLNetwork affecting: No
Pings to the public interface of the firewall sometimes failed. This issue has
been resolved.
PCR: 02085Module: SWINetwork affecting: No
The default route table (DEFIP table) could be corrupted when RIP routes
were added or deleted from the table. This issue has been resolved.
PCR: 02089Module: SWINetwork affecting: No
The port number is now considered when the layer 3 routing table is
displayed.
PCR: 02090Module: SWINetwork affecting: No
A fatal error occurred when default routes in the DEFIP table were
associated with a port whose status changed (up/down). Also, invalid
routes that were deleted from DEFIP were not re-added to DEFIP when they
became valid again. These issues have been resolved.
PCR: 02092Module: SWINetwork affecting: No
The SET SWITCH L3 FILT command overwrote existing Layer 3 filters. If
multiple filter entries existed, this command changed the most recent entry,
rather than the one specified. These issues have been resolved. Also, the SET
SWITCH L3 FILT command now allows for creation of multiple filter
entries with the SETPRIORITY and SETTOS parameters. The Layer 3 filter
protocol match now has no limit.
PCR: 02093Module: SWINetwork affecting: No
Improvements have been made to trunking on all Rapier models. Now the
master (lead) port of the trunk group is always configured correctly.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
PCR: 02094Module: IPGNetwork affecting: No
When an IP flow table contained the IP flow structure for a spoofed packet,
the SHOW IP FLOW command would crash when executed. This issue has
been resolved.
PCR: 02095Module: SWINetwork affecting: No
The software routing performance of the Rapier 48 and Rapier 48i has been
enhanced.
Page 28
28Patch Release Note
PCR: 02096Module: IPG, SWINetwork affecting: No
When the switch received an IGMP query, it created an entry in the
hardware-based multicast table that had incorrect port tagging information.
This issue has been resolved. Also, IGMP will no longer participate in
changing the hardware multicast table when IP multicast switching
emulation is enabled.
PCR: 02098Module: STPNetwork affecting: No
STP always transmits untagged packets. If a port does not belong to a
VLAN as an untagged port, then the port must belong to one VLAN as a
tagged port. In this case, STP should transmit VLAN tagged packets out of
the port.
PCR: 02099Module: DHCPNetwork affecting: No
A switch sometimes restarted if it was configured with static DHCP entries
and was handling a large number of DHCP clients. This issue has been
resolved.
PCR: 02100Module: PIMNetwork affecting: No
When a VLAN was configured as a PIM interface, and had trunked ports as
members, PIM did not work properly on the trunked ports. This issue has
been resolved.
PCR: 02101Module: SWINetwork affecting: No
The layer 3 hardware table was not sorted properly when it contained a
very wide range of IP addresses (eg. 10.0.0.1 - 205.33.3.1). This caused a
small number of packets to be routed by software rather than hardware.
This issue has been resolved.
PCR: 02103Module: SWINetwork affecting: No
IPX traffic passing between two switch instances using VLAN for Rapier48
now operates correctly.
PCR: 02104Module: TRGNetwork affecting: No
The periodic and time trigger counts were incrementing by two instead of
one on each update. This issue has been resolved.
PCR: 02106Module: IPGNetwork affecting: No
The ADD IP ARP command can now accept ports 49 and 50.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 29
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers29
Features in 86231-04
Patch file details are listed in Table 7:
Table 7: Patch file details for Patch 86231-04.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
27-Feb-2002
86231-04.paz
58456 bytes
Patch 86231-04 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 02005Module: IPGNetwork affecting: No
When telnetting to the switch, the TCP connection was reset, and when the
packet was passed to IPG_Forward a fatal error occurred. This patch
implements a workaround.
PCR: 02056Module: IGMPNetwork affecting: No
An addition to the patch resolves issues with IGMP reflooding query
packets to tagged ports.
Features in 86231-03
Patch file details are listed in Table 8:
Table 8: Patch file details for Patch 86231-03.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
21-Feb-2002
86231-03.paz
57516 bytes
Patch 86231-03 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 01288Module: SWINetwork affecting: No
In situations where a switch port has been forced to half duplex mode and
the link partner is forced to full duplex mode it is possible for the switch to
enter a state where it is unable to transmit packets. This patch prevents this
state from being reached despite the misconfiguration.
PCR: 02019Module: SWINetwork affecting: No
If a layer 3 hardware filter for a particular packet type (e.g. Netbeui) was
configured, all IP packets destined for the CPU were discarded. This issue
has been resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 30
30Patch Release Note
PCR: 02035Module: VLANNetwork affecting: No
The CREATE CONFIG command now correctly configures tagged ports
belonging to VLANs not in the default STP.
PCR: 02042Module: LPDNetwork affecting: No
The TCP port 00515 (LPD) is now closed by default until a CREATE LPD
command is executed. The port then remains open until a router restart.
PCR: 02043Module: X25Network affecting: No
The X.25 TCP listen port (01998) is now closed by default until a CREATE
X25C command or SET X25C TCPKEEPALIVE command is executed. The
port then remains open until a router restart.
PCR: 02044Module: STTNetwork affecting: No
The TCP listen port 05026 (STT) is now closed by default until a ADD STT
command is executed. The port then remains open until a router restart.
PCR: 02045Module: OGMNetwork affecting: No
Improved the display of buttons when using the Netscape browser, and
improved the Modify VLAN page in the GUI.
PCR: 02047Module: SWINetwork affecting: No
Invalid values were presented when reading MIB variables from the STP
port table. This issue has been resolved.
PCR: 02048Module: CORENetwork affecting: No
Some Rapier products returned invalid sysObjectIds. This issue has been
resolved.
PCR: 02049Module: IPGNetwork affecting: No
Special multicast packets (ie. 224.0.0.3 - 224.0.0.255) were sometimes not
recognised as being multicast packets. This issue has been resolved.
PCR: 02050Module: RMONNetwork affecting: No
Some SNMP trap identifiers generated by a rising or falling alarm were
incorrect. This issue has been resolved.
PCR: 02056Module: IGMPNetwork affecting: No
Incoming multicast traffic from a source connected to a switch port
operating in multicast mode B (flood multicast packets with no registered
member) will no longer flood the VLAN associated with the port. Only
member ports and router ports on the same VLAN will receive the traffic.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 31
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers31
Features in 86231-02
Patch file details are listed in Table 9.
Table 9: Patch file details for Patch 86231-02.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
8-Feb-2002
86231-02.paz
40272 bytes
Patch 86231-02 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 02033Module: SWINetwork affecting: No
When a Rapier “i” series switch transmitted an internally generated tagged
packet, the packet was transmitted with an FCS error. This issue has been
resolved.
PCR: 02034Module: SWINetwork affecting: No
Under certain circumstances multicast packets were duplicated on egress.
This issue has been resolved.
Features in 86231-01
Patch file details for Patch 86231-01 are listed in Table 10.
Table 10: Patch file details for Patch 86231-01.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
86s-231.rez
5-Feb-2002
86231-01.paz
39804 bytes
Patch 86231-01 includes all issues resolved and enhancements released in
previous patches for Software Release 2.3.1, and the following enhancements:
PCR: 01214Module: SWINetwork affecting: No
In a Rapier G6, fitted with a fibre uplink module with all ports active,
switching traffic between port 1 and the uplink caused the traffic flow to
cease after a period of time depending on the volume of traffic. This issue
has been resolved.
PCR: 01221Module: SWINetwork affecting: No
Flow control performance has been improved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 32
32Patch Release Note
PCR: 01243Module: SWINetwork affecting: No
When a Rapier CPU was handling a large amount of traffic and a busy
egress port went down, it was possible for the transmission of packets by
the CPU to cease. This issue has been resolved.
PCR: 01249Module: CORE, SWINetwork affecting: No
Support for the AT-40/41 100Mbit fibre uplink modules has been added.
PCR: 01250Module: SWINetwork affecting: No
On Rapier “i” series models, outgoing packets (originating from the CPU)
consisting of chained buffers were corrupted by the insertion of four bytes
at the end of the first buffer in the chain. This affected L2TP calls over an
Ethernet connection. This issue has been resolved.
PCR: 01252Module: SWINetwork affecting: No
On the Rapier 48 in certain circumstances (e.g. a routing update or ARP
deletion) the layer 3 switching table became corrupted and the wrong
egress port was used for flows. This issue has been resolved.
PCR: 01254Module: PRINetwork affecting: No
When an M2 version of the AR020 PRI E1/T1 PIC was installed in a AR040
NSM it was not possible to select the T1 mode of operation regardless of the
jumper setting. This issue has been resolved.
PCR: 01261Module: IPG/VRRPNetwork affecting: No
A fatal error occurred when forwarding IP packets with VRRP enabled. This
issue has been resolved.
PCR: 01265Module: SWINetwork affecting: No
When trunking was in operation, in some instances the switch transmitted
tagged packets on untagged trunk ports. This issue has been resolved.
PCR: 01276Module: SWINetwork affecting: No
When the speed of one or more switch ports was forced to a half duplex
setting and the ports were then added to a trunk group configured for full
duplex operation, the port settings were not overridden by the trunk group
speed setting. The trunk group speed setting will now take precedence over
the port speed setting.
PCR: 01284Module: PCINetwork affecting: No
PAC cards with the Hifn 7951 chipset now operate correctly on Rapier
switches. PAC cards with the older Hifn 7751 chipset are not supported on
Rapier switches.
PCR: 01289Module: VRRPNetwork affecting: No
The checksum in VRRP advertisements was not being calculated correctly.
The calculation was not compatible with the RFC. This issue has been
resolved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Page 33
Patch 86231-10 For Rapier Switches and AR800 Series Modular Switching Routers33
PCR: 01290Module: PPPNetwork affecting: No
When PPP was running over Ethernet to a client from another vendor, the
Maximum Transmission Unit value for the link was not adjusted from the
PPP default of 1500 to 1492. This issue has been resolved.
PCR: 01291Module: IPG(IGMP)Network affecting: No
IGMP did not send the Start Up Query, and the Other Querier Present Timer
did not change the Time Out value accordingly if Query Interval was
changed. IGMP did not notify other registered parties (PIM and DVMRP)
when a port was deleted from a membership group. IGMP reported a
membership leave to other parties while it was still waiting for a reply to a
group specific query from a leaving member. These issues have been
resolved.
PCR: 02002Module: OSPFNetwork affecting: No
The SHOW OSPF NEIGHBOUR command incorrectly displayed neighbour
information. This issue has been resolved.
PCR: 02013Module: SWINetwork affecting: No
The switch was forwarding oversize packets. The maximum frame length
was 1528 bytes. The maximum frame length is now 1524 bytes on gigabit
ethernet ports and 1522 bytes on fast ethernet ports.
PCR: 02015Module: SNMPNetwork affecting: No
A fatal error occurred when an invalid SNMP message was received. This
issue has been resolved.
PCR: 02016Module: SWINetwork affecting: No
L3 filter commands now allow intermediate subnet masks.
PCR: 02023Module: PIMNetwork affecting: No
PIM hello messages were not sent as tagged packets over a tagged port. This
issue has been resolved.
PCR: 02028Module: PPPNetwork affecting: No
When PPPoE AC received a PADT packet it caused a fatal error. This issue
has been resolved.
PCR: 02030Module: SWINetwork affecting: No
Configuration and operation of L3 filters has been improved.
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Availability
Patches can be downloaded from the Software Updates area of the Allied
Telesyn web site at www.alliedtelesyn.co.nz/support/updates/patches.html
licence or password is not required to use a patch.
. A
Page 34
34Patch Release Note
Patch 86231-10 for Software Release 2.3.1
C613-10328-00 REV J
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.