Download Print this page
Allied Telesis 86222-10 Release Notes
Allied Telesis 86222-10 Release Notes

Allied Telesis 86222-10 Release Notes

Patch for rapier switches and ar800 series modular switching routers

Advertisement

Quick Links

Patch Release Note
Patch 86222-10
For Rapier Switches and AR800 Series
Modular Switching Routers
Simply connecting the world
Introduction
This patch release note lists the issues addressed and enhancements made in
patch 86222-10 for Software Release 2.2.2 on existing models of Rapier L3
managed switches and AR800 Series L3 modular switching routers. Patch file
details are listed in Table 1.
Table 1: Patch file details for Patch 86222-10.
Base Software Release File
Patch Release Date
Compressed Patch File Name
Compressed Patch File Size
This release note should be read in conjunction with the following documents:
Release Note: Software Release 2.2.2 for Rapier Switches, AR300 and
AR700 Series Routers, and AR800 Series Modular Switching Routers
(Document Number C613-10313-00 Rev A) available from
www.alliedtelesyn.co.nz/documentation/documentation.html.
Rapier Switch Documentation Set for Software Release 2.2.1 available on
the Documentation and Tools CD-ROM packaged with your switch, or
from www.alliedtelesyn.co.nz/documentation/documentation.html.
AR800 Series Modular Switching Router Documentation Set for Software
Release 2.2.1 available on the Documentation and Tools CD-ROM
packaged with your switching router, or from
documentation/documentation.html.
WARNING: Using a patch for a different model or software release may cause
unpredictable results, including disruption to the network. Information in this
release note is subject to change without notice and does not represent a
commitment on the part of Allied Telesyn International. While every effort has
been made to ensure that the information contained within this document and
the features and changes described are accurate, Allied Telesyn International
can not accept any type of liability for errors in, or omissions arising from the
use of this information.
86s-222.rez
29-Nov-2001
86222-10.paz
295536 bytes
www.alliedtelesyn.co.nz/

Advertisement

loading
Need help?

Need help?

Do you have a question about the 86222-10 and is the answer not in the manual?

Questions and answers

Summary of Contents for Allied Telesis 86222-10

  • Page 1 Introduction This patch release note lists the issues addressed and enhancements made in patch 86222-10 for Software Release 2.2.2 on existing models of Rapier L3 managed switches and AR800 Series L3 modular switching routers. Patch file details are listed in Table 1.
  • Page 2 Module: SWI, CORE, IPG Module: SWI Module: IPG Patch Release Note Network affecting: No 86s-222.rez 27-Nov-2001 86222-09.paz 295444 bytes Network affecting: Yes Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 3 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01248 A configuration problem prevented trunking of gigabit ports at 100Mbit speeds. This issue has been resolved. The A39 gigabit copper uplink reverted to autonegotiation after a restart, even if it was configured to a fixed speed.
  • Page 4 Module: OSPF Module: IPG Module: L2TP, IPG Patch Release Note Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 5 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01197 Debug messages are no longer generated when a Q.931 Advise of Charge Notification message is received. PCR: 01198 TCP sessions would get stuck in the FINWAIT2 state if the remote host did not send a FIN message when required.
  • Page 6 Module: SWI Patch Release Note Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 7 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01234 A switch port that was transmitting STP BPDUs and also mirroring its transmit traffic to the mirror port caused a fatal error. This issue has been resolved.
  • Page 8 Patch Release Note Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 9 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01186 When large numbers of sessions were being handled the firewall would become overly aggressive in restricting new sessions. The Active TCP Opens field in the output of the SHOW FIREWALL POLICY would show a very high number (42 ×...
  • Page 10 Module: Firewall 86s-222.rez 8-Aug-2001 86222-03.paz 205828 bytes Patch Release Note Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 11 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01112 DNS response packets with corrupt length fields were causing a fatal error. This issue has been resolved. PCR: 01139 IP NAT caused a fatal error when an ARP wait timer timed out and tried to send a host unreachable message.
  • Page 12 Module: SWI Module: PKI Patch Release Note Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Network affecting: No Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...
  • Page 13 Patch 86222-10 For Rapier Switches and AR800 Series Modular Switching Routers PCR: 01119 Repeated addition and deletion of an address with the VALID parameter set to or from an IPV6 interface caused a fatal error. This issue has been corrected. The VALID parameter specifies the life of the address, and defaults to INFINITE.
  • Page 14 Patch Release Note Patch 86222-10 for Software Release 2.2.2 C613-10319-00 REV J...