Specifications
Features in 291-08 81
Version 291-18
C613-10488-00 REV Q
CR00017093 Firewall 2 When the router was acting as a firewall and performing DNS relay, it used
the local IP interface private address as the source address for some packets
that it sent out the public interface. When the router acts as a DNS relay, it
receives DNS requests from the private interface and sends a new packet
on the public interface. These new packets were given the wrong address.
This issue has been resolved. Such packets now have their source address
set to the public interface address as required.
YYYYYY- - - - Y
CR00017226 IPsec 2 If an IPsec tunnel with no encryption (NULL) was negotiated in AlliedWare
over NAT-T, the ESP packets did not contain an RFC 3948 compliant
checksum. This means that some vendors may have discarded packets sent
by the AlliedWare peer over such a tunnel.
This issue has been resolved.
Note the null encryption is useful for debugging the traffic over an IPsec
tunnel and should not be used in a working IPsec solution.
YYYYYY- - - - -
CR00017227 IPsec 2 An IPSec checksum recalculation error occurred with UDP traffic when the
ESP encapsulation was added.
This issue has been resolved.
YYYYYY- - - - -
CR00017255 Switching 2 Previously, trunk members were given the STP state in hardware of port 1,
instead of having the STP state of the lead port in the trunk. The software
state (as displayed with the command show stp port) was correct.
This issue has been resolved.
---YYYYY---
CR00017256 Switching 2 When using multi-homed IP interfaces on a VLAN, it was possible that L3
hardware switching would stop for all multi-homed interfaces on that
VLAN, if one of the multi-homed interfaces was removed or went into an
administratively down state.
This issue has been resolved.
--------YY-
CR Module Level Description
AR400
AR7x5
AR7x0S
Rapier i
Rapier w
AT-8800
AT-8600
AT-8700XL
x900-48
AT- 9900
AT-9800