TMS zl Module Release Notes ST.1.0.090603
Software Fixes ST.1.0.090603
Release ST.1.0.090603
Monitor Mode
■ PR_14582 — In monitor mode, the CLI command ips help does not reflect the commands
that are actually available in monitor mode as opposed to routing mode.
High Availability
■ PR_38385 — Connection reservations do not fail over from the Master to the Participant in
an Active-Standby configuration.
Example:
PC DMZ 10.10.30.254 | TMS | Zone1 192.168.1.254 PC Server
10.10.30.1 192.168.1.1
Zone limits DMZ = 5
Connection reservation DMZ, inbound, reserved for 192.168.1.1, Reservation count = 3
If the PC opens TCP connections through the Master, and a fail over situation occurs, the
reservation count was not correctly followed.
■ PR_38959 — In High Availability Active-Standby configuration, when running a mix of RTSP
and SMTP traffic for a period, the command no connections does not reset some of the current
connections.
VPN
■ PR_38173 — Misleading error messages appear when adding or editing an IKE policy in the
Web browser interface (VPN > Certificates > IPsec Certificates).
■ PR_38217 — When setting up an IPsec policy with a Key Exchange of Manual, it was possible
to specify an SPI number that was already in use by another IPsec policy and it would not
be detected. Duplicate SPI numbers across IPsec policies are not allowed and an error needs
to be displayed.
■ PR_38223 — When adding an IPsec policy with action Bypass or Ignore, and setting the
direction to Inbound, the traffic selector's local and remote addresses would be swapped.
■ PR_38226 — Changing a bypass or ignore IPsec policy to apply shows an erroneous key
exchange method.
■ PR_38228 — A misleading error occurs when the traffic selector's IP range starts or ends
with 255. Workaround: Correct the range.
■ PR_38229 — IPsec policy advanced settings are displayed incorrectly after the default
settings are changed and then edited in the Web browser interface.
■ PR_38231 — On the advanced settings screen (VPN > IPsec > IPsec Policies) Enable fragment
before IPsec cannot be disabled.
13