Download Print this page
Allied Telesis AT WA1104G SOHO Wireless Router  AT-WA1104G-10 AT-WA1104G-10 Release Note
Allied Telesis AT WA1104G SOHO Wireless Router  AT-WA1104G-10 AT-WA1104G-10 Release Note

Allied Telesis AT WA1104G SOHO Wireless Router AT-WA1104G-10 AT-WA1104G-10 Release Note

Software maintenance release note version 291-10

Advertisement

Quick Links

Software Maintenance Release Note
Maintenance Version 291-10
for AR415S, AR440S, AR441S, AR442S, AR450S, AR725, AR745, AR750S, AR750S-DP, and AR770S routers and
AT-8600, AT-8700XL, Rapier i, Rapier w, AT-8800, AT-8900, x900-48, AT-9900, and AT-9800 Series switches
This software maintenance release note lists the issues addressed and enhancements made in Maintenance Version 291-10 for Software Version 2.9.1. Version
details are listed in the following table:
Models
AR415S, AR440S, AR441S, AR442S, AR450S
AR750S, AR750S-DP, AR770S
AR725, AR745
AT-8624T/2M, AT-8624PoE, AT-8648T/2SP
AT-8724XL, AT-8748XL
Rapier 24i, Rapier 48i, Rapier 16fi
Rapier 48w
Series
Release File
Date
AR400
54291-10.rez
24 July 2007
AR7x0S
55291-10.rez
24 July 2007
AR7x5
52291-10.rez
24 July 2007
AT-8600
sr291-10.rez
24 July 2007
AT-8700XL
87291-10.rez
24 July 2007
Rapier i
86291-10.rez
24 July 2007
Rapier w
86291-10.rez
24 July 2007
Size (bytes)
GUI file
4946220
415s_291-10_en_d.rsc
440s_291-10_en_d.rsc
441s_291-10_en_d.rsc
442s_291-10_en_d.rsc
450s_291-10_en_d.rsc
4074888
750s_291-10_en_d.rsc (AR750S and AR750S-DP)
4114292
_725_291-10_en_d.rsc
_745_291-10_en_d.rsc
2468216
8624t_291-10_en_d.rsc
8624poe_291-10_en_d.rsc
8648t_291-10_en_d.rsc
2411128
8724_291-10_en_d.rsc
8748_291-10_en_d.rsc
4587048
r24i_291-10_en_d.rsc
r16i_291-10_en_d.rsc
r48i_291-10_en_d.rsc
4587048
-

Advertisement

loading
Need help?

Need help?

Do you have a question about the AT WA1104G SOHO Wireless Router AT-WA1104G-10 AT-WA1104G-10 and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Summary of Contents for Allied Telesis AT WA1104G SOHO Wireless Router AT-WA1104G-10 AT-WA1104G-10

  • Page 1 Software Maintenance Release Note Maintenance Version 291-10 for AR415S, AR440S, AR441S, AR442S, AR450S, AR725, AR745, AR750S, AR750S-DP, and AR770S routers and AT-8600, AT-8700XL, Rapier i, Rapier w, AT-8800, AT-8900, x900-48, AT-9900, and AT-9800 Series switches This software maintenance release note lists the issues addressed and enhancements made in Maintenance Version 291-10 for Software Version 2.9.1. Version details are listed in the following table: Models AR415S, AR440S, AR441S, AR442S, AR450S...
  • Page 2 Caution: Information in this release note is subject to change without notice and does not represent a commitment on the part of Allied Telesis, Inc. While every effort has been made to ensure that the information contained within this document and the features and changes described are accurate, Allied Telesis, Inc. can not accept any type of liability for errors in or omissions arising from the use of this information.
  • Page 3 Levels Some of the issues addressed in this Maintenance Version include a level number. This number reflects the importance of the issue that has been resolved. The levels are: Level 1 This issue will cause significant interruption to network services, and there is no work-around. Level 2 This issue will cause interruption to network service, however there is a work-around.
  • Page 4 Features in 291-10 Software Maintenance Version 291-10 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” indicates that the resolution is available in Version 291-10 for that product series. ■ “...
  • Page 5 Module Level Switching The resolution to CR 444 meant that packets processed by the CPU are now CR00018663 subjected to the same filtering as packets switched in hardware. However, this filtering did not always return the expected results. Sometimes its IP address matching was incorrect, and it did not correctly process filters with an action of nodrop.
  • Page 6 Level 3 Module Level Ping Traceroute (the trace command) did not work. It returned the error “The CR00018514 destination is either unspecified or invalid” even if the destination was reachable. This issue has been resolved. Level 4 No level 4 issues Enhancements No enhancements Version 291-10...
  • Page 7 Features in 291-09 Software Maintenance Version 291-09 includes the enhancement in the following table, which is available for x900-48FE and x900-48FE-N switches. Level 1-4 No level 1-4 issues Enhancements Module Level Core CPU fan monitoring is now disabled by default on x900-48FE and CR00018530 x900-48FE-N switches.
  • Page 8 Features in 291-08 Software Maintenance Version 291-08 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” indicates that the resolution is available in Version 291-08 for that product series. ■ “...
  • Page 9 Module Level Classifier The following issues existed with classifiers: CR00003495 ■ classifiers matching protocol=ipv6 and ipprotocol=icmp could be created more than once ■ classifiers matching protocol=ipv6 and ipprotocol=1 could be created but were meaningless because 1 represents IPv4 ICMP ■ classifiers matching protocol=ip and ipprotocol=58 could be created but were meaningless because 58 represents IPv6 ICMP.
  • Page 10 Module Level RIPng The following issues occurred with RIPng: CR00007178 ■ RIPng dropped requests from peers with non link-local addresses. ■ for a solicited response, if the routes did not exist on the device, RIPng returned a metric of 0 for them instead of returning a metric of 16 ■...
  • Page 11 Module Level If the router or switch received an LCP packet with an unrecognised CR00010967 protocol, it responded with a ProtocolReject packet of incorrect length that did not respect the established MRU of the peer. This issue has been resolved. CR00010968 When the established Maximum Receive Unit (MRU) of the remote PPP peer was greater than the established MRU of the local PPP peer, Echo Reply...
  • Page 12 Module Level Unexpected characters could appear on the terminal emulator display CR00012871 when the column size was set greater than 80 and the user edited a command that spanned more than one line of the display. This issue has been resolved. CR00013597 DVMRP, If a frame relay interface was configured as a DVMRP interface, then the...
  • Page 13 Module Level IPv6 If a user shortened the prefix length of an IPv6 interface address, then CR00013778 lengthened it, it became impossible to change the prefix length again. This issue has been resolved. CR00013893 MSTP Executing the commands disable mstp port=number or enable mstp port=number would not disable or enable the port on all MSTIs.
  • Page 14 Module Level PIM6 If an IPv6 accelerator was used, and the upstream router forwarded IPv6 CR00014827 multicast data just before the prune limit timer expired, then the downstream router sometimes did not send the prune until significantly after the timer expired. This issue has been resolved.
  • Page 15 Module Level IPv6 The timer that governs the interval between repeated neighbour CR00016587 solicitation messages could only be configured by using the ndretrans parameter of the set ipv6 nd command, and not through router advertisements that the router or switch received from other routers. This issue has been resolved.
  • Page 16 Module Level If a PPP instance was destroyed after an attached ATM channel had been CR00016985 modified using the set atm channel command, the router rebooted. The router could also reboot if an ATM channel was deleted under similar circumstances. This issue has been resolved.
  • Page 17 Module Level IPsec If an IPsec tunnel with no encryption (NULL) was negotiated in AlliedWare CR00017226 over NAT-T, the ESP packets did not contain an RFC 3948 compliant checksum. This means that some vendors may have discarded packets sent by the AlliedWare peer over such a tunnel. This issue has been resolved.
  • Page 18 Module Level QoS, Some small memory access violations existed in DHCP snooping. CR00017368 DHCP These violations have been resolved. Snooping Also, a new console error message is displayed if a user tries to add a duplicate classifier to a QoS policy. For example, if traffic class 101 belongs to policy 2 and a user tries to add a flow group to traffic class 101 when the flow group’s classifier is number 54 and already belongs to policy 2, the following message is displayed:...
  • Page 19 Module Level ISAKMP The router or switch sometimes could not establish a VPN when the remote CR00017518 peer was behind a NAT gateway and the router or switch’s remote ID was set to default. This issue has been resolved. CR00017634 If a PPPoE AC service had been added, but AC mode had not been enabled by using the enable ppp ac command, PADI frames were processed anyway, potentially leading to a reboot.
  • Page 20 Module Level IP Gateway, When the DHCP server was enabled on a router or switch that also had a CR00017731 DHCP local IP interface defined by using the set ip local command, outgoing DHCP server packets would use the set ip local command's IP address as their source address.
  • Page 21 Level 3 Module Level Some PKI commands (including add pki ldap, create pki enroll, and CR00000503 create pki keyupdate) only worked if their parameters were entered in a particular order. This issue has been resolved. The command add fire policy=name rule=number act=allow int=int CR00001106 ip=ipadd list=filename would incorrectly be rejected, with an error message stating that list and ip were mutually exclusive.
  • Page 22 Module Level File The show file command did not check whether the specified file system CR00004004 was valid. If an invalid file system type was entered (such as show file=abc:*.*), the router or switch reported that no files found instead of reporting that the file system abc did not exist.
  • Page 23 Module Level SNMP On AR725 and AR745 routers, which have no VLAN support, an SNMP Get CR00006303 request for dot1qMaxVlanId or dot1qMaxSupportedVlans incorrectly returned a value. This issue has been resolved. CR00006613 Bridge Predefined bridge protocols XEROX PUP and PUP Addr Trans with the encapsulation of EthII and protocol type 0x0200 and 0x0201 are invalid and obsolete, since they are less than the minimum ETHII protocol type of 1500 (decimal).
  • Page 24 Module Level When prompted to enter a file name while using the command line file CR00008122 editing utility, no more than 23 characters could be typed, even if the existing characters were deleted using the backspace key. This issue has been resolved. CR00008378 Firewall The command enable firewall notify=port port=asyn-number was not...
  • Page 25 Module Level Install If a user attempted to enter a filename with an invalid format, the resulting CR00010306 error message did not correctly describe the format that should have been used. Also, the router or switch returned an incorrect error message when a user attempted to delete a non-existent release licence file.
  • Page 26 Module Level PPP incorrectly ACKed a LCP ConfigureRequest containing the Magic- CR00010979 Number option with a value of 0. This issue has been resolved. CR00010984 If the router or switch received an incorrectly formatted PAP request packet, it used to process the packet. This issue has been resolved—now it silently discards the packet.
  • Page 27 Module Level Ping When the router or switch pinged a host whose hostname consisted only CR00011438 of the digits 0-9 and the letters A-F, it treated the given hostname as a hexadecimal IPX address even if the hostname was in the host list. This issue has been resolved.
  • Page 28 Module Level IP Gateway Once a default local IP address had been set, it could not be deleted. This CR00013494 was because the default interface does not have an interface number, but to delete a local interface, the user must specify the interface’s number. This issue has been resolved, by adding an option called default to the delete ip local command.
  • Page 29 Module Level EPSR, SNMP When a user destroyed an EPSR domain, SNMP Requests returned CR00013832 information about the domain even though it no longer existed. This issue has been resolved. CR00013920 Ping, If a user attempted to perform a traceroute without specifying the address Traceroute to trace (either in the trace or set trace commands), the router or switch attempted to trace 0.0.0.0.
  • Page 30 Module Level LLDP The help displayed for the LLDP port parameter (in such commands as CR00014304 show lldp port=?) incorrectly indicated that the port parameter is a “string 1 to 255 characters long”. The port parameter is instead an Ethernet switch port number or a range of numbers. This issue has been resolved.
  • Page 31 Module Level It is valid to use the command create ppp=number to create a PPP CR00016452 interface without specifying the underlying layer 1 interface. However, executing this command, or including it in a boot script, resulted in an error. This issue has been resolved. CR00016578 IPv6 If IPv6 was disabled and a user entered any of the following commands:...
  • Page 32 Module Level Port On termination of an 802.1x session, an accounting message is sent to the CR00017019 Authentication Radius server. This enhancement implements the Acct-Input-Octets, Acct-Output-Octets, Acct-Input-Packets, and Acct-Output-Packets fields in the message. Note that this enhancement only applies to ports in single-supplicant mode. These fields in the accounting message for ports in multi-supplicant mode still all have a value of 0.
  • Page 33 Enhancements Module Level The BGP counter output display has been significantly improved. Also, the CR00012822 command show bgp counter=all now prints out the RIB, UPDATE, DB and PROCESS counters. MACFF, MAC-forced forwarding has been enhanced for use in a hospitality CR00016099 situation, such as a hotel.
  • Page 34 Module Level This software release supports the new x900-48FS switch. For an overview CR00016662 CR00016891 of the switch, see on page CR00017335 CR00017937 CR00016913 This enhancement enables the PPPoE client to establish a session promptly after a restart or power cycle. This is done by sending a PPPoE Active Discovery Terminate (PADT) frame in response to a frame received with an unknown PPPoE session ID.
  • Page 35 Module Level IGMP The IGMP snooping fast leave option has been enhanced, to make it CR00017482 Snooping available when multiple clients are attached to a single port on the snooping switch. For configuration information, see leave in multiple host mode—CR00017482” on page CR00017532 WAN Load WAN load balancing can now also balance traffic across IP interfaces that...
  • Page 36 Features in 291-07 Software Maintenance Version 291-07 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” indicates that the resolution is available in Version 291-07 for that product series. ■ “...
  • Page 37 Features in 291-06 Level 4 No level 4 issues Enhancements No enhancements Features in 291-06 Software Maintenance Version 291-06 provided support for the new Rapier 48w switch. For more information, see “Support for the new Rapier 48w switch” on page Version 291-10 C613-10488-00 REV G...
  • Page 38 Features in 291-05 Software Maintenance Version 291-05 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” indicates that the resolution is available in Version 291-05 for that product series. ■ “...
  • Page 39 Module Level VLAN Previously, it was possible to destroy a VLAN when it was configured as an IP CR00012980 interface. This issue has been resolved. Now, you can only destroy a VLAN if it has no IP configuration. CR00013041 IPsec The router or switch would establish IPsec Security Associations (SAs) if ISAKMP was enabled but IPsec was disabled.
  • Page 40 Module Level Firewall When only NAT was enabled on the firewall, during some TCP connections in CR00015569 which either end of the connection sends FIN (finished) messages immediately after sending some data and the other end ACKs (acknowledges) the data and the FIN message consecutively, the firewall sometimes incorrectly interpreted the first ACK message (intended for the data) as belonging to the FIN message and prematurely shut the connection down.
  • Page 41 Module Level DHCPv6 For DHCPv6, the router or switch now supports Prefix Delegation according to CR00015938 RFC 3633. The previous implementation was according to an Internet draft and did not interoperate with other DHCPv6 implementations. This issue has been resolved. CR00015974 DHCPv6 The DHCPv6 client regularly wrote the file client6.dhc, which over time caused...
  • Page 42 Module Level IPsec, IPv6 When the icmptype parameter was changed to none for an IPv6 IPsec policy, an CR00016128 incorrect ICMP type value was displayed in output of the command show config dyn and saved in the configuration file produced by the command create config.
  • Page 43 Module Level DHCPv6 If an IPv6 DHCP client was forced to rebind to a router or switch acting as a DHCP CR00016364 server, the server returned incorrect timing parameters to the client. Some clients were able to cope with this, but others could end up losing their DHCP lease. This issue has been resolved.
  • Page 44 Module Level When BGP capability matching was changed to strict, that setting was not CR00016489 displayed in output of the command show config dyn or saved in the configuration file produced by the command create config. When the router or switch ran the configuration file on start-up, the capability matching setting reverted to the default of loose.
  • Page 45 Module Level TCP, Telnet The speed of the output from the Telnet server has been increased. CR00016727 CR00016762 ISDN For AR44xS series routers with system territory set to USA, the ISDN Q.931 SPIDs failed to initialize to the ISDN exchange/ISDN USA profile simulator (both manual and auto SPIDs) after a reboot.
  • Page 46 Module Level Core Some versions of the AT-G8T GBIC prevented the switch from detecting and CR00016940 setting up the AT-A47 expansion board correctly. This issue occurred on start-up when the GBIC was installed and had a link up. This issue has been resolved. CR00016941 IP Gateway When there were multiple routes to a destination and the best route was deleted...
  • Page 47 Module Level DHCPv6 DHCPv6 prefix delegation contained the followed issues: CR00017074 ■ previously, the command create dhcp6 range accepted ranges with an invalid prefix length. This issue has been resolved. The router or switch now displays an error unless the prefix length is in the range 48-64. ■...
  • Page 48 Module Level WAN Load If two WAN load balancer healthcheck hosts were defined, and one was CR00017257 Balancer unreachable and the other was reachable, WAN load balancer resources were (correctly) in the UP state because at least one healthcheck host was reachable. However, removing the reachable host (by using the command delete wanlb healthcheck) should have changed the WAN load balancer resources to the DOWN state, but did not.
  • Page 49 Level 3 Module Level Core Some early software versions, on some products, supported the command show CR00008225 system temperature. This command was deprecated after version 2.6.4. If a user entered this command on any product, the following message was displayed: Info (1034107): SHOW SYSTEM TEMPERATURE is no longer available.
  • Page 50 Module Level PIM, PIM6, Previously, the switch’s count of PIM4 and PIM6 bad Bootstrap Messages (BSMs) CR00011629 ECMP could be high, because the switch forwarded BSMs over interfaces that contained an Equal Cost Multipath (ECMP) route to the receiving interface. This issue has been resolved.
  • Page 51 Module Level ASYN Under some circumstances, when a PC terminal emulator was opened to CR00015558 communicate with a router or switch after the router or switch had fully booted up, the login prompt did not immediately display. To display the login prompt, it was necessary to remove and re-insert the cable.
  • Page 52 Module Level If a QoS policy uses the same classifier more than once, the router or switch now CR00016228 displays a warning message. You should not use a classifier more than once in a policy because the operation of such policies is unpredictable. CR00016463 DHCPv6 For the command create dhcp6 range, DHCPv6 now checks that the specified...
  • Page 53 Level 4 Module Level CR00000396 IGMP If a static IGMP port went link down, it was not shown in the “Static Ports” list in the output of the show ip igmp command. This was only a display issue. This issue has been resolved. Install It is no longer possible to specify a compact flash file as the boot configuration CR00011560...
  • Page 54 Enhancements Module Level An ADSL connection option has been added to the Wizards page of the GUI for CR00014288 AR44xS routers. This option links to the xDSL configuration section, which lets you configure all basic ADSL or SHDSL settings on one convenient page. If your router GUI does not open at the Wizards page, click on the Wizards button at the top of the left-hand menu to access it.
  • Page 55 Module Level IPsec, IPv6 To establish a tunnelled IPsec connection for IPv6, you may need to specify the CR00016150 source IP interface in the IPsec and ISAKMP policies. This enhancement enables you to do so. To specify the source interface, use the srcinterface parameter in the commands: create ipsec policy=name <other parameters>...
  • Page 56 Module Level DHCP This enhancement enables the router or switch to log discarded ARP requests CR00016234 Snooping when ARP security is enabled. By default, discarded ARP requests are not logged. To turn logging on, use the command: enable dhcpsnooping log=arpsecurity To turn it off, use the command: disable dhcpsnooping log=arpsecurity To see whether it is enabled, use the existing command:...
  • Page 57 Module Level Core This enhancement disables CPU fan monitoring on AT-8948 switches. Monitoring CR00016459 the fan is unnecessary unless an accelerator card is installed on the switch, so disabling monitoring reduces the number of messages that the switch displays and logs. To enable monitoring, use the command: enable cpufanmonitoring To disable it again, use the command:...
  • Page 58 Module Level IP NAT This enhancement enables you to turn off TCP state and sequence checking in IP CR00016758 NAT. It also allows all ICMP packets go through IP NAT. To do this, use the command: enable ip nat bypasstcp When bypasstcp is enabled, IP NAT performs IP address and port translation for TCP packets and forwards the packets, regardless of the TCP sequence number and the current TCP state.
  • Page 59 Features in 291-04 Software Maintenance Version 291-04 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” indicates that the resolution is available in Version 291-04 for that product series. ■ “...
  • Page 60 Module Level Core DHCP Snooping determines when a client lease will expire by taking the current CR00014145 time and adding the client's assigned lease period to it. Previously, DHCP DHCP Snooping did not update this expiry time if the switch's clock time changed, Snooping which can happen because of NTP, summertime, or a user manually re-setting the time.
  • Page 61 Module Level HTTP A badly formed response from a particular HTTP server caused the router or CR00013592 switch to reboot when it attempted to load a non-existent file from that server. This issue has been resolved. CR00013700 IP Gateway When an IP packet was queued by the ENCO module or other applications, and the IP flow for the packet became invalid while the packet was queued, the router or switch sometimes rebooted.
  • Page 62 Module Level Switch When the router generated packets (such as ARP requests) and sent them out CR00014228 multiple LAN ports, it always sent them as untagged packets. This issue has been resolved, so that LAN traffic will be tagged or untagged as specified in the VLAN port configuration.
  • Page 63 Module Level If a PIM interface was set as the BSR candidate interface (by using the command CR00014714 add pim bsrcandidate interface=interface) and that interface went down, PIM would select another interface as the BSR candidate interface. The router or switch also set the new interface as the BSR candidate interface in the dynamic configuration.
  • Page 64 Module Level Core If a terminal emulator started up after the router started up, the router did not CR00014987 display a login or command prompt. This issue occurred with some terminal Switch emulators (including Tera Term Pro) when connecting to the AR415S router. This issue has been resolved.
  • Page 65 Module Level The GUI could not be used to access the dual power supply AR750S-DP router. CR00015348 This issue has been resolved. The GUI resource file to use is 750s_281-06_en_d.rsc. CR00015396 IP Gateway If you defined an IP filter without specifying the optional type parameter, the default value of type=traffic was added to the filter in the dynamic configuration.
  • Page 66 Module Level Switch It was not possible to set a tri-speed SFP to a fixed speed in the configuration CR00015936 script that the AT-9924SP switch runs when it starts up. This issue has been resolved, so the SFP can be set to a fixed speed from the configuration script Also, it was possible to use the command set swi port=number speed on an empty SFP bay.
  • Page 67 Level 3 Module Level GUI, IGMP The graphical user interface (GUI) listed an invalid local interface in the Interface CR00007000 drop-down list on the page for adding a static IGMP association. This issue has been resolved. CR00009274 Switch If many VLANs simultaneously went from up to down, or down to up, the switch became unresponsive for a period of time.
  • Page 68 Module Level IP Gateway If an IP interface was added and deleted many times, an excessive number of CR00010136 memory buffers became full. Also, when an IP interface was deleted, the IGMP query timer (set ip igmp int=interface querytimeout=value) sometimes continued running and later caused the router or switch to reboot.
  • Page 69 Module Level User When authenticating users via RADIUS, the number of times that the router or CR00012585 switch attempts to contact the RADIUS server is determined by the Server Retransmit Count (displayed in output of the command show radius). Previously, this count incorrectly included the initial request. For example, a Retransmit Count of 3 meant that up to 3 attempts were made to contact the server.
  • Page 70 Module Level IGMP When IGMP fast leave was enabled and the switch received a leave message via CR00013629 a trunk port, the switch only removed the port from the multicast group if the port was the master trunk port. This issue has been resolved. When fast leave is enabled, non-master trunk ports now leave multicast groups as soon as the switch receives a leave message.
  • Page 71 Module Level Firewall When the firewall was performing NAT on UDP video streams and two streams CR00014163 started up at the same time, sometimes one or both streams displayed excessive jitter. This issue has been resolved. CR00014178 Core The following issues occurred with environmental monitoring: ■...
  • Page 72 Module Level IP Gateway, If a port had static ARP entries defined for a VLAN, then adding the port to CR00014328 another VLAN made those static ARP entries inactive. Switch Also, deleting a port from a VLAN would delete all static ARP entries that were defined on that port, including entries for other VLANs.
  • Page 73 Module Level BOOTP It was possible to add a BOOTP relay destination using an interface that was not CR00014755 running IP. It was also possible to delete an IP interface even though BOOTP relay IP Gateway destinations were defined for the interface. Both of these situations could allow the router or switch to be mis-configured.
  • Page 74 Module Level IP Gateway When a router or switch was configured to use DHCP to assign an address on an CR00015148 interface, and then set to have a static address on that interface, the DHCP client DHCP in the router or switch would continue to negotiate with the DHCP server. This tied up a DHCP lease.
  • Page 75 Module Level IP Gateway Subnet broadcast packets would not be routed correctly when the interface to CR00015666 which the subnet broadcast was destinated was an interface on the device, but its link status was down. Even though an alternate route to the destination existed, the device would send the packets incorrectly.
  • Page 76 Level 4 Module Level Core When the router or switch rebooted, its internal clock lost approximately CR00004677 1 second. This issue has been resolved. The time loss on reboot has been reduced. CR00009087 Core, Utility The following issues occurred with the commands show debug active and disable debug active: ■...
  • Page 77 Module Level MSTP If the command set mstp cist port=value was entered with no other CR00012602 parameters, the resulting error message (“One or more parameters may be missing”) was displayed as an INFO message. This issue has been resolved. The message now displays as an ERROR message. CR00013045 SNMP, Core, The MIB object hrSystemNumUsers displayed the number of login users since the...
  • Page 78 Module Level Ping Previously, if you used the ? or Tab keys to obtain help about the timeout CR00013463 parameter for the ping command, the resulting help said that the maximum timeout was 65535. However, the correct maximum is 60 seconds. This issue has been resolved.
  • Page 79 Module Level VLAN The following error message: CR00014151 “Error (3089399): Operation not allowed on a .NESTED port.” contained an extraneous “.” before the word “NESTED”. This issue has been resolved. The “.” has been removed. CR00014170 Core The show exception command did not display the correct exception type for watchdog exceptions on AR750S, AR750S-DP, or AR770S routers.
  • Page 80 Module Level DHCP Previously, when a user entered the command delete dhcp range=range CR00014750 ip=ipadd, the router or switch would display an “Operation successful” message, even when the client entry in question was unused. This issue has been resolved. For unused clients, this command now results in the following new message: “Nothing to delete, client is unused.”...
  • Page 81 Enhancements Module Level Core It is now possible to hotswap NSMs on NEBS-compliant Rapier i switches. CR00003036 To hotswap the NSM, press the Hot Swap button beside the NSM, check that the Swap LED turns on and the In Use LED turns off, then remove the NSM. Place the new NSM in the bay, then press the Hot Swap button again to make the NSM available for use.
  • Page 82 Module Level Core AR770S routers have a CPU fan that the software now monitors in the same CR00013992 manner as the main fan. The state of the CPU fan is displayed along with that of the main (chassis) fan in the output of the show system command. If a problem develops with the CPU fan, the router notifies you in the following ways: ■...
  • Page 83 Module Level BOOTP This enhancement enables you to associate a BOOTP relay destination with a CR00014172 given interface. To do this, use the new optional interface parameter in the command: ADD BOOTp RELAy=ipadd INTerface=interface BOOTP packets received on this interface are relayed to the specified relay destination only.
  • Page 84 Module Level This enhancement enables you to force BGP to select the best route on the basis CR00014241 of network prefix alone, instead of on the basis of preference, then metric, then IP Gateway network prefix. To do this: 1. Give the desired dynamic routing protocol a preference of 0, which is the preference of interface routes, by using the command: SET IP ROUte PREFerence=0 PROTocol={BGP-ext|BGP-int|OSPF-EXT1| OSPF-EXT2|OSPF-INTEr|OSPF-INTRa|OSPF-Other|RIP|ALL}...
  • Page 85 Module Level DHCP The following enhancements have been made to DHCP snooping, to support CR00014300 Snooping, MAC-forced forwarding: MACFF ■ MAC-forced forwarding checks the DHCP snooping database to find out which router has been assigned to each DHCP client. DHCP snooping determines this from the router list in DHCP acknowledgement messages.
  • Page 86 Module Level A new log message has been added to provide more information about rejected CR00014715 DNS requests. The message has a log type of 052 / IPDNS and subtype 002 / UNRES, and reads: DNS request for <domain-name> rejected by server. Code <number>, <explanation>.
  • Page 87 Module Level IP Gateway When OSPF is running over an on-demand PPP link and the link goes down, IP CR00014845 notifies OSPF that the link is down and OSPF stops sending Hello packets over the OSPF link. In a network in which routes over the PPP link are all dynamically learnt through OSPF, the PPP link will not come back up because without OSPF there are no routes to direct traffic at that link.
  • Page 88 Features in 291-03 Software Maintenance Version 291-03 includes the resolved issues and enhancements in the following tables. In the tables, for each product series: ■ “Y” in a white column indicates that the resolution is available in Version 291-03 for that product series. ■...
  • Page 89 Module Level IPv6 When a switch was heavily loaded with IPv6 traffic, it could reboot because a CR00015678 large quantity of traffic was queued while waiting for a neighbour's MAC address to resolve. This issue has been resolved by limiting the number of packets that can be queued while waiting for a neighbour's MAC address to resolve.
  • Page 90 Module Level Destroying a traffic class or flow group also destroyed all classifiers that were CR00014959 associated with that traffic class or flow group. This issue has been resolved. User-created classifiers are no longer destroyed. Automatically-created classifiers are still destroyed, such as classifiers for DHCP snooping.
  • Page 91 Enhancements Module Level IGMP IGMP snooping learns which ports have routers attached to them, so it can CR00014222 snooping, forward relevant IGMP messages out those ports. By default, snooping identifies router ports by looking for ports that receive specific multicast packets (such as Switch, IGMP queries, PIM messages, OSPF messages, and RIP messages).
  • Page 92 Support for the new x900-48FS switch—CR00016662 The x900-48FS is a new model in the x900 Series of layer 3 gigabit and fast Ethernet switches. Its key features are: ■ Multi-layer Fast Ethernet switch ■ 48-port 100BASE-X SFP sockets, 100 Mbps, full or half duplex ■...
  • Page 93 IGMP snooping fast leave in multiple host mode—CR00017482 The IGMP snooping fast leave option has been enhanced, to make it available when multiple clients are attached to a single port on the snooping switch. Fast leave now has two modes available: ■...
  • Page 94 The detail parameter displays more detailed information, including expiry times for each port, and in the case of multiple host fast leave mode, the list of hosts on a port. The following example shows this. IGMP Snooping -------------------------------------------------------------------------- Status ... Enabled Disabled All-groups ports ...
  • Page 95 Support for the new Rapier 48w switch The Rapier 48w is a new model in the Rapier Series of layer 3 gigabit and fast Ethernet switches. Its key features are: ■ 48-port 10BASE-T/100BASE-TX (RJ-45 connectors) ■ Two 1000BASE SFP ports ■...
  • Page 96: Save The Configuration

    Backing up the configuration with SNMP—CR00016221 With this enhancement, you can use SNMP to: ■ set parameters for uploading files from the router or switch, and ■ upload files to a TFTP server SNMP already lets you save the current configuration to a file on the router or switch. You can use this with the new options to back up the configuration to a TFTP server.
  • Page 97 Backing up the configuration with SNMP—CR00016221 2. Set the load parameters To specify the server IP address, use SNMP SET loadServer. To set the filename, use SNMP SET loadFilename. The following screenshot shows setting the filename to tst.cfg. Version 291-10 C613-10488-00 REV G...
  • Page 98 Backing up the configuration with SNMP—CR00016221 3. Upload the file To upload the file, use SNMP SET loadStatus and set it to a value of 8. The following screenshot shows this. Version 291-10 C613-10488-00 REV G...
  • Page 99 SNMP ASN.01 BER Padding—CR00016523 This enhancement enables you to specify whether SNMP adds 0x00 padding when the most significant 9 bits of an object’s value are all 1, or whether the encoding follows the ASN.01 BER rule, which cuts off the most significant byte of 0xff. This setting has an impact on all integer type MIB objects, including 32 bit and 64 bit counter objects.