HP Switch Services Modules - HP SECBLADEII-CMW520-R3175 Release Notes Release Notes

6
List of resolved problems
Resolved problems in R3175
HSD106243
Symptom: When you modify an inter-zone policy that includes hundreds of rules
through a remote desktop connection, you might lose the remote desktop
connection.
Condition: This symptom might occur when you modify an inter-zone policy that
includes hundreds of rules through a remote desktop connection.
HSD109417
Symptom: If you configure a URL hostname comprised of only numbers for content
filtering, save the configuration, and then reboot the firewall, the URL hostname gets
lost.
Condition: This symptom occurs if you configure a URL hostname comprised of only
numbers for content filtering, save the configuration, and then reboot the firewall.
HSD112739
Symptom: Configuring a NAT address pool with an index number of 1000 or higher in
the Web interface fails.
Condition: This symptom occurs if you configure a NAT address pool with an index
number of 1000 or higher in the Web interface.
HSD112914
Symptom: After the firewall operates for a long time in a stateful failover asymmetric
routing scenario, egress port errors might occur to some service packets.
Condition: This symptom might occur after the firewall operates for a long time in a
stateful failover asymmetric routing scenario.
HSD113119
Symptom: If you export the configuration file through configuration backup and then
import the configuration file through configuration import, the firewall prompts that
some configurations are failed to be imported.
Condition: This symptom occurs if you export the configuration file through
configuration backup and then import the configuration file through configuration
import.
Resolved problems in F3174P10
HSD111103
Symptom: QoS does not function when session acceleration is enabled on the firewall.
Condition: This symptom occurs if session acceleration is enabled on the firewall.
HSD111480
Symptom: IKE SA negotiation in phase 2 fails.
Condition: This symptom occurs if the data protection mode of per-host is specified for
ACL-based IPsec that protects traffic in specific VPN multi-instance.