Release Notes

Page 1 of 4
© 2003 SonicWALL, Inc. SonicWALL is a registered trademark of SonicWALL, Inc. Other product and company names mentioned herein may be trademarks and/or registered
trademarks of their respective companies.
P/N 232-000373-00
Rev A 04/03
Release Notes for the SOHO TZW Internet Security Appliance
Prepared by SonicWALL, Inc.
04/25/03
SonicOS 1.0 is now available only on the SOHO TZW Internet Security appliance. This release
note provides technical information on the initial release of this product.
Some firmware updates include updates for the wireless radio card. This information is
provided when the firmware update is released. Firmware updates that include updates
for the Wireless radio card can cause the Test, WLAN, WiFiSec, and Wireless LEDs to
remain lit while the firmware is uploading to the appliance. Do not power the unit off
during the update as this permanently damages your wireless radio card. After the
firmware upload is complete, the SOHO TZW automatically restarts and completes the
firmware update.
If you begin a management session using the WLAN interface and interrupt the session
by opening another management session on the LAN, you can interrupt active WLAN to
LAN sessions at the TCP layer.
If you experience multiple failures while attempting to establish a PPPoE connection, it
may be necessary to reboot the SOHO TZW to restore PPPoE functionality.
Wireless Guests and Users are not unique accounts. If the same user name and
password is created for a wireless guest and a user, the Wireless Guest account is
referenced.
Changing the HTTP management port on a SOHO TZW providing Wireless Guest
Services requires a reboot to ensure that wireless guest Web browsers are redirected to
the correct URL (specifying the new port) for authentication.
To create simultaneous Global VPN Client connections through the SOHO TZW to a
remote point and the WLAN, with or without WiFiSec enforcement, you must first create
the connection through the SOHO TZW to the remote termination point on the Internet,
and then to the WLAN port.
Attempting to create a VPN policy that enables Perfect Forward Secrecy and Forward
Packets to Remote VPNs can cause unfounded proposal-based Phase 2 failures.
If WiFiSec is enforced on the WLAN, the only broadcast traffic allowed on the WLAN is
NetBIOS, DHCP, and ARP. All other broadcast traffic is dropped by design.
If the WLAN radio fails, the SOHO TZW watchdog automatically reboots in an attempt to
recover from the failure. If the WLAN LED blinks following the automatic recovery
process, this indicates that the WLAN radio requires a full reset. Please power off the
SOHO TZW; wait a few seconds, then power on to completely reset the WLAN radio.

Summary of content (4 pages)