TMS zl Module Release Notes ST.1.2.101122
38
Software Fixes in Releases ST.1.0.090213 - ST.1.2.101122
Release ST.1.1.100430
■ PR_43869 — When a Zone is renamed, the new Zone name does not show up in log files.
■ PR_46963 — When rate limit reaches the limit defined per policy, a log message is generated
for every packet drop.
■ PR_50209 — Log messages with mid=615, 1350, 1355, 624, 621, 605 are not critical but classified
as critical.
■ PR_51204 — The web browser interface for Port Triggers allows a Port Trigger Policy Name
to accept invalid characters
■ PR_52458 — Active TCP sessions are incorrectly closed when a failover occurs as a result
of modifying a Firewall policy or policies prior to the failover.
■ PR_42667 — Stateful firewall connections do not get closed promptly when their lifetime
reaches 0. From the TMS zl Module CLI, the show connections command will show
connections with a lifetime of 0 but which have not been removed. The sessions eventually
should be deleted, in most circumstances. If the number of sessions with 0 lifetime gets to
a very high level, a scheduled maintenance reboot of the TMS zl Module is required.
■ PR_9711 — When a user authenticates by way of the firewall using RADIUS, they get the
correct policy for their group. However, if the policy is changed while the user’s session is
active, the user is not disconnected automatically to force re-authentication to provide the
updated policy. In contrast, a user that is authenticated by way of the Local database is
disconnected and must re-authenticate when the policy is updated.
■ PR_52989 — A user with 'operator' privileges was allowed to close network connections
using the command 'no connections'.
■ PR_52999 — In the web browser interface, go to Firewall>Settings>ALGs page. When on
that page, if you save the configuration by using the save link and then press the ALG tab to
refresh the page, the page is not refreshed and an error message is displayed.
■ PR_53052 — In the web browser interface, when adding a Schedule for an Access Policy,
the schedule would be added but a false error would be displayed when the 'Apply' button
was pressed.
■ PR_53849 — When a user creates an access policies with a rate or packet limits for ftp and
the ALG for ftp is activated the ftp traffic is not limited.
VPN
■ PR_45525 — A TMS zl Module that receives GRE keep-alive packets may log those as a DoS
attack.
■ PR_50586 — RADIUS server modification is not allowed after an L2TP connection.