Allied Telesis 86253-07 Speaker User Manual


 
Patch 86253-07 For Rapier Series Switches SHOW IGMPSNOOPING ROUTERADDRESS 21
Patch 86253-07 for Software Release 2.5.3
C613-10382-00 REV E
The switch was adding a router port for multicast packets to destinations
with an address in the range 224.0.0.x. Switch port entries are now only
created for special router multicast addresses.
If the DHCP server had a policy name greater than 5 characters long, and a
very long MERITDUMP or ROOTPATH value, the device could not
correctly create the configuration. This issue has been resolved.
A fatal error occurred when a long string of text was pasted over an existing
long string of text at the CLI. This issue has been resolved.
An ETH interface was sometimes shown as Up in the output of the SHOW
INTERFACE command when it was actually Down. This issue has been
resolved.
Under some circumstances traffic did not have NAT applied if a standard
subnet NAT rule was added to a public interface. Such rules did not
correctly match incoming traffic when the REMOTEIP parameter in the
ADD FIREWALL POLICY RULE command was not specified, and the
destination IP address was not the interface’s actual IP address. If this
situation occurred, traffic was redirected back out the public interface. This
issue has been resolved.
Software emulation of layer 3 hardware filtering was not operating
correctly. Packets that the switch had no routing information for were
filtered incorrectly. The first packet of a flow that should have been dropped
was not dropped, and a flow that should have been allowed was being
dropped. This issue has been resolved.
The CREATE CONFIG command did not generate the TYPE parameter for
ADD IPV6 INTERFACE commands. This issue has been resolved.
The ADD SWITCH FILTER command returned an incorrect error message
if a broadcast address was specified for the DESTINATION parameter. This
issue has been resolved.
When IGMP snooping was disabled with the DISABLE IGMPSNOOPING
command, IGMP packets were not flooded. This issue has been resolved.
ARP requests with invalid source MAC and IP addresses were being
processed, but should have been dropped. This issue has been resolved.
PCR: 03890 Module: IGMP, SWI Level: 2
PCR: 03895 Module: DHCP Level: 2
PCR: 03896 Module: TTY Level: 3
PCR: 03898 Module: ETH Level: 3
PCR: 03902 Module: FIREWALL Level: 3
PCR: 03906 Module: SWITCH Level: 2
PCR: 03907 Module: IPV6 Level: 2
PCR: 03911 Module: SWI Level: 3
PCR: 03914 Module: IPG, VLAN Level: 3
PCR: 03921 Module: IP ARP Level: 3