Release Notes for the SOHO TZW Internet Security Appliance
Prepared by SonicWALL, Inc.
04/25/03
SonicOS 1.0 is now available only on the SOHO TZW Internet Security appliance. This release
note provides technical information on the initial release of this product.
• Some firmware updates include updates for the wireless radio card. This information is
provided when the firmware update is released. Firmware updates that include updates
for the Wireless radio card can cause the Test, WLAN, WiFiSec, and Wireless LEDs to
remain lit while the firmware is uploading to the appliance. Do not power the unit off
during the update as this permanently damages your wireless radio card. After the
firmware upload is complete, the SOHO TZW automatically restarts and completes the
firmware update.
• If you begin a management session using the WLAN interface and interrupt the session
by opening another management session on the LAN, you can interrupt active WLAN to
LAN sessions at the TCP layer.
• If you experience multiple failures while attempting to establish a PPPoE connection, it
may be necessary to reboot the SOHO TZW to restore PPPoE functionality.
• Wireless Guests and Users are not unique accounts. If the same user name and
password is created for a wireless guest and a user, the Wireless Guest account is
referenced.
• Changing the HTTP management port on a SOHO TZW providing Wireless Guest
Services requires a reboot to ensure that wireless guest Web browsers are redirected to
the correct URL (specifying the new port) for authentication.
• To create simultaneous Global VPN Client connections through the SOHO TZW to a
remote point and the WLAN, with or without WiFiSec enforcement, you must first create
the connection through the SOHO TZW to the remote termination point on the Internet,
and then to the WLAN port.
• Attempting to create a VPN policy that enables Perfect Forward Secrecy and Forward
Packets to Remote VPNs can cause unfounded proposal-based Phase 2 failures.
• If WiFiSec is enforced on the WLAN, the only broadcast traffic allowed on the WLAN is
NetBIOS, DHCP, and ARP. All other broadcast traffic is dropped by design.
• If the WLAN radio fails, the SOHO TZW watchdog automatically reboots in an attempt to
recover from the failure. If the WLAN LED blinks following the automatic recovery
process, this indicates that the WLAN radio requires a full reset. Please power off the
SOHO TZW; wait a few seconds, then power on to completely reset the WLAN radio.
Page 1 of 4
© 2003 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be trademarks and/or registered
trademarks of their respective companies.
P/N 232-000373-00
Rev A 04/03
Release Notes for the SOHO TZW Internet Security Appliance
• XAUTH support for SecureID’s New PIN Mode, Next PIN Mode, and Next Token Mode
is excluded from this release.
• Changing the VPN keying method, for example, IKE to Manual Mode or Manual Mode to
IKE, can inadvertently change the subnet mask of the defined remote destination
network.
• Some wireless cards, notably Netgear and Linksys 54G cards, have demonstrated
compatibility issues when connecting to other manufacturer’s devices. Compatibility
issues are further complicated by the use of WEP, or by increasing the beaconing
interval beyond its default value. It is strongly recommended that you upgrade to the
latest firmware and device drivers available from your wireless client card’s
manufacturer, particularly if you are using Netgear or Linksys 54G equipment.
• By default, the TZW does not handle WLAN based WiFiSec tunneled packets larger
than 1,518 bytes (packets requiring fragmentation). If you are running a large packet
protocol (such as Kerberos or certain UDP applications), you must create a specific
access rule for that protocol, and enable fragmentation on that rule.
• Extremely heavy WiFiSec WLAN traffic loads could result in spurious IPSec Replay
Attack log messages.
• Changing the WAN interface mode, for example, from NAT Enabled to NAT with DHCP
Client while using DHCP services on the TZW can cause the current DHCP lease table
to be flushed.
• Attempting a configuration requiring wireless clients to connect to the TZW with a
WiFiSec connection, and the TZW then attempts to route all traffic through a VPN
connection to a hub termination point can result in failed phase 2 negotiations between
the hub and the TZW.
• Although validation and error-checking is implemented on all management entry fields, it
is strongly recommended that user names, service names, comments, etc. not contain
any non-alphanumeric characters such as apostrophes or backslashes.
• Internet Explorer 5.2.2 running on a Mac exhibits numerous page rendering problems.
When using a Mac for management, an alternative browser (e.g. Safari, iCab, Opera,
Mozilla) is recommended.
Microsoft Windows XP and the SOHO TZW
If you are running Microsoft Windows XP as your computer’s operating system, Windows XP, by
default, manages your wireless PC card settings. If you want to use the Microsoft wireless
management tools rather than your card vendor’s management tools, please note the following
information:
• Your wireless PC card drivers must be compatible with Microsoft’s Wireless Zero
Configuration service.
• You can access the wireless card settings by clicking on the wireless card icon in the
system tray, or by right-clicking on the My Network Places icon on the desktop and
double-clicking on the wireless card icon. When the initial configuration screen appears
it lists all of the wireless networks available. Click Advanced on the lower left side of
this screen.
Page 2 of 4
© 2003 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be trademarks and/or registered
trademarks of their respective companies.
P/N 232-000373-00
Rev A 04/03