Allied Telesis R800 Series Network Router User Manual


 
Patch 86222-22 For Rapier Switches and AR800 Series Modular Switching Routers 9
Patch 86222-22 for Software Release 2.2.2
C613-10319-00 REV U
The virtual MAC address was used as the source MAC for all packets
forwarded on an interface associated with a Virtual Router (VR). This was
confusing when multiple VRs were defined over the same interface because
only one virtual MAC address was ever used. The other virtual MAC
addresses (for the other VR's) were only used if the source IP address
matched the VR’s IP address. To avoid this confusion, the system MAC
address is now always used unless the source IP address of the packet is the
same as the VR’s IP address.
PIM or DVMRP failed to see any data if IGMP snooping was on and
DVMRP or PIM was enabled after the data stream had reached the router/
switch. This issue has been resolved.
MAC address lists were not working with Firewall rules. This issue has
been resolved.
HTTP requests from a fixed IP address were erroneously reported as a host
scan attack in the Firewall deny queue. This issue has been resolved.
Under certain circumstances, the Asyn Loopback Test failed. This issue has
been resolved.
ARL message interrupts have been re-enabled after a software table rebuild
to fix synchronisation of the software forwarding database with the
hardware table.
Some routes were not added into the OSPF route list, and therefore were not
added into the IP route table. This issue has been resolved.
The CREATE CONFIG command did not save the SOURCEPORT
parameter to the configuration file when the low value of the source port
range was set to zero. This issue has been resolved.
Existing IGMP groups were not deleted when IGMP was disabled globally
or on the associated interface. This gave the groups very high timeout
values. This issue has been resolved.
If a packet with a destination IP address equal to a VRRP IP address was
received when the router didn’t own the IP address, (because it didn’t have
an interface with that IP address) the router incorrectly tried to forward the
packet and send an ICMP “redirect” message to the source. Now, if such a
packet is received, it will be discarded and an ICMP “host unreachable”
message will be sent to the source.
PCR: 02263 Module: VRRP Network affecting: No
PCR: 02264 Module: PIM, DVMRP, SWI Network affecting: No
PCR: 02265 Module: FIREWALL Network affecting: No
PCR: 02268 Module: FIREWALL Network affecting: No
PCR: 02269 Module: DUART, TM Network affecting: No
PCR: 02274 Module: TPAD Network affecting: No
PCR: 02275 Module: OSPF Network affecting: No
PCR: 02276 Module: FIREWALL Network affecting: No
PCR: 02287 Module: IPG Network affecting: No
PCR: 02299 Module: VRRP Network affecting: No