Allied Telesis AR44xS series Switch User Manual


 
Features in 276-01 58
Version 276-05
C613-10474-00 REV D
CR00011213
PIM 6 2 Previously, the switch treated a valid bootstrap message as a bad message if it
received the message on two or more interfaces, and when PIM6 operated in a
looped or network topology that had multiple unicast routes to the same
destination(s), it sometimes selected a sub-optimal route for RPF interface
selection for RP and BSR elections.
This issue has been addressed by an additional algorithm to deal with equal cost
multipath routes as follows:
a. if more than one route to the same given destination with equal cost exists,
then the route with highest nexthop IP address value will be selected.
b. if the nexthop IP address values are the same (the routes come from the same
device on different interfaces), then the routes with highest interface index will
be selected.
YY
YYY- -YYY
CR00011243
ISAKMP 2 Previously, if an IPsec/ISAKMP tunnel was under heavy load, an ISAKMP peer may
have retransmitted messages. When the last message in an ISAKMP exchange
was retransmitted, the remote peer did not expect to receive the second message
after the exchange had finished and caused the router or switch to reboot.
This issue has been resolved.
YY
YYY-----
CR00011269
SSL 2 When the SSL server had multiple concurrent users, some SSL sessions failed to
establish, because the SSL handshakes failed.
This issue has been resolved.
YY
YYYYYYYY
CR00011300
User 2 Previously, if the router or switch was acting as an 802.1x authenticator, and it
received an illegal RADIUS packet (an Access-Reject packet with an EAP code of
“successful”), the router or switch would reboot.
This issue has been resolved. The switch now rejects such authentication
requests.
YY
YYYYYYYY
CR Module Level Description
AR44xS / AR450S
AR7x5
AR750S
Rapier i
AT-8800
AT-8600
AT-8700XL
AT-8948
AT-9900
AT-9800