TMS zl Module Release Notes ST.1.1.100330

39
Known Issues
Release ST.1.1.100226
PR_42272 — In the Web browser interface, an obscure error message is displayed if the
Peer IP address is set with a value 224.x.x.x or greater. Steps to recreate:
A GRE Tunnel has already been created.
1. Open the TMS zl Module Web browser interface.
2. Go to the VPN section.
3. Select the GRE link.
4. Go to the GRE Tunnels tab
5. Click the edit button from the previously created GRE tunnel.
6. Edit the Peer IP address field with a value 224.x.x.x or greater.
7. Click the OK button.
PR_43471 — With IPsec using a DSA or RSA Certificate, a TMS zl Module and a ProCurve
Secure Router 7100 fail to authenticate as IPsec peers.
PR_43916 — RADIUS authentication for L2TP users could result in the user's connection
getting established and immediately getting disconnected without notification. The RADIUS
server must return the service-type attribute with a value of framed. If the service-type attribute
is not set to framed or is not available, the L2TP session gets established and immediately
disconnected without notification.
PR_44356 — Using a VPN with L2TP and IPsec Certificates is not supported.
PR_44478 — TMS zl Module does not support CRL retrieval via HTTP, LDAP, or OCSP.
PR_44479 — TMS zl Module will use the old CRL past the next CRL update time if it has not
retrieved the new CRL.
PR_44555 — When checking the IKE SA status on the Web browser interface, the SA lifetime
value is not automatically updated. For example, if a user clicks on View Status several times,
the SA lifetime remains the same and is not updated.
PR_44671 — A log entry shows authentication of remote L2TP peer is successful (mid=526)
despite failure. The L2TP user is not allowed access due to lack of a service-type Frame
attribute being returned from the RADIUS server. See PR_43916 for details.
PR_44781 — The TMS zl Module may log an erroneous log message when a user connects
via L2TP.
time="2009-09-04 13:39:27" severity=info pri=6
fw=ProCurve-TMS-zl-Module id=routing msg="KRT READ STATIC 172.16.80.2
mask 255.255.255.255 router 172.16.80 flags <UP STATIC>401: queuing
delete for duplicate entry