Item | Description | Bug ID |
---|---|---|
1. | After upgrading the Alteon software version, the application Intermittently was not working. | prod00277501 |
2. | On an Alteon VA, Alteon reset the connection when traffic failed over. | prod00277059 |
3. | IPv6 SNMP queries over the data port were not working because checking for management access with the ingress data port failed. | prod00277282 |
4. | On an Alteon 5424 platform with 24G RAM and software version 32.4.1.10, the maximum sessions remained as 11M even though the sesscap value was 100%. | prod00277362 |
5. | AppWall for Alteon was not parsing parameters whose values matched the string "banana" (%F0%9F%8D%8C). | prod00274209 |
6. | When using HTTP/2 after login, traffic stops working. | prod00278070 |
7. | Connections to a VIP closed abruptly. | prod00276584 |
8. | During stress traffic, a panic occurred. | prod00278081 |
9. | The Alteon 6024 platform rebooted due to a panic. | prod00276360 |
10. | The Alteon NG+ license did not apply the 5 vADC license. | prod00276639 |
11. | The port speed capability was not handled for the MR platform XGE interface while dumping the port configuration and port auto-negotiation configuration options, resulting ins no diff configuration. | prod00275660 |
12. | Using WBM, when starting a packet capture, unexpected data displayed for /c/sys/alerts when the packet capture filter string was set to more than 128 characters. | prod00275473 |
13. | In an SLB environment, when the session move operation was executed, in some cases this operation was not reset on one of the SPs, which resulted in all subsequent session move operations to fail on that particular SP. | prod00276340 |
14. | The priorities for remote real servers among different GSLB network did not behave as expected. In this version, priority is given to nwclasses matching in added networks. As a result, if there is a SIP match for one of the networks, a network with SIP=any will not be considered. If there is no SIP match for networks with SIP configured, then a network with SIP=any will be considered. Priority is considered among the real servers of the matched network. | prod00277208 |
15. | After upgrading to version 31.0.11.0, SSL offload did not work properly. | prod00276274 |
16. | SSL traffic caused a panic. | prod00278067 |
17. | When a device came up after reboot, the HA status displayed as NONE because the HA state was recorded based on the current HA service group state for which the apply was in process. | prod00275640 |
18. | In an SLB environment with a pbind client IP address, persistence was not maintained. | prod00275950 |
19. | Trend Micro's IWSVA (AV) in ICAP mode (with Alteon acting as ICAP client) was only partially working. | prod00277015 |
20. | With AES used for privacy and/or encryption, the initialization vector was not set properly, causing AES encryption to fail. | prod00276313 |
21. | When logged in as a TACACS or RADIUS user, could not modify or create SNMPv3 authentication or privacy passwords. | prod00277012 |
22. | Using WBM, a user could change the admin password while being authenticated via TACACS or RADIUS. Usually a user is not allowed to change the admin password when logged in with "admin Privileged" using TACACS or RADIUS. | prod00277394 |
23. | During SNMP polling, a panic occurred. | prod00277993 |
24. | In an SLB environment, after a config sync was performed with PIP sync disabled. Alteon did not replace the client IP address with a PIP. | prod00277517 |
25. | When changing to the default configuration, the runtime session capacity was not reflected. | prod00276875 |
26. | During an upgrade to version 32.2.30 or later, the configuration became stuck in diff. | prod00276743 |
27. | When an HTTP modification string was configured with multiple escape sequences, Alteon did not insert an escape sequence. | prod00276936 |
28. | In a GSLB environment, Alteon became stuck with high MP CPU utilization. | prod00276520 |
29. | When the management port was disabled, syslog messages were not sent on the data port. | prod00278037 |
30. | In a DSR environment, there was a discrepancy between /info/swkey and virtual server statistics. | prod00277932 |
31. | When processing the second fragment destined for the Alteon interface when the redirect filter was configured, Alteon panicked. | prod00277481 |
32. | Using WBM, you could not edit the IP address for a new Outbound LLB Rule. | prod00277386 |
33. | BGP 4 Byte ASN was not compatible with Cisco Nexus 9K and Huawei routers. | prod00276711 |
34. | An invalid hypervisor type was set for virtual platforms. | prod00276260 |
35. | VRs and Switch HA and Service HA configurations sometimes would flap or go into the INIT state after synching the configuration from the secondary device to the primary device if there was a difference in the configuration between the two devices. | prod00276501 |
36. | Using WBM, could not configure BGP 4-byte-ASN. | prod00276810 |
37. | Traffic was forwarded to a failed WAN real server. | prod00276356 |
38. | The remote system refused the connection, impacting Azure NA self-service. | prod00277311 |
39. | When the Alteon HA state changed from Master to Backup, the gateway and real server's health checks failed. | prod00278210 |
40. | When changing from ena to dis and vice versa, could not apply the /cfg/l3/ha/switch/filtpbkp command. | prod00277753 |
41. | Could not log in to AppWall. | prod00275567 |
42. | On DPDK platforms, Interface errors for port statistics were issued. | prod00278281 |
43. | ICAP responses were not forwarded to the client. | prod00276506 |
44. | In an IPv6 SLB environment with an IPv6 HTTP health check and IPv6 HA configured, the memory allocated for HTTP HC was not freed, which led to a memory leak. | prod00276962 |
45. | When AES was used for privacy and/or encryption, the initialization vector was not set properly, causing AES encryption failure. | prod00276312 |
46. | On an ADC-VX, the device banner and /boot/cur show different active Alteon versions. | prod00276979 |
47. | On a vADC, incorrect Throughput Alert messages were issued. | prod00275924 |
48. | While STG information was sent from an ADC-VX to a vADC, a panic occurred. | prod00278078 |
49. | When importing a configuration with BGP, Alteon issued Notice messages with non-ASCII characters. | prod00275647 |
50. | On an ADC-VX, the device banner and /boot/cur show different active Alteon versions. | prod00276977 |
51. | Added GSLB site IP address validation. | prod00277095 |
52. | After a panic, the Admin context went into a reboot loop. | prod00276327 |
53. | There were many FLOOD entries being created in the FDB table for the PIP MAC. This caused some of the traffic to fail. | prod00277246 |
54. | Using the preempt disabled feature, a primary real server that was moved to the OPER DIS state by the HC module when the backup was UP for the service, continued to be in the OPER DIS state even when the "backup" and "preempt dis" settings were removed from it. | prod00276616 |
55. | Using WBM, during configuration sync, continuous fetching of the virtual server table caused a panic. | prod00277467 |
56. | Could not sync or apply changes. | prod00276399 |
57. | In an SLB environment with preemption disabled for the primary real server, when it was in the failed state and the backup real server became the primary, the original primary real server became the backup server when its health check came UP, even though preemption was disabled. | prod00277337 |
58. | When the primary WAN link went down and the backup WAN link took over, an incorrect syslog message displayed. | prod00276691 |
59. | A confusing configuration resulted while implementing LDAP(S) health check. | prod00275745 |
60. | In a LinkProof for Alteon environment, there were Intermittent ICMP packet drops. When pinging from the same sequence number, the ping reply packets dropped intermittently. | prod00276795 |
61. | Using WBM on a vADC, could not renew an SSL certificate. | prod00276405 |
62. | An HTTP header modification value set to None was considered as valid input. | prod00277186 |
63. | After HA failover, Alteon lost router connectivity in order to reach real servers. | prod00277715 |
64. | Enabling and disabling HTTP/2 caused service impact. | prod00275418 |
65. | The backup group status in a content rule displayed an incorrect status when the backup group was not directly associated to any service. | prod00276758 |
66. | In an Azure environment, Alteon VA crashed. | prod00276481 |
67. | Using WBM, when "Return to Last Hop" was set for a virtual server, an additional field type was also set internally. | prod00276933 |
68. | The Intermediate CA certificate could not be imported due to unexpected max limit. | prod00278075 |
69. | Using Alteon VA, there were multiple core dumps that resulted in the file system becoming full. | prod00277683 |
70. | An explicit proxy caused unexpected behavior for HTTP/HTTPS traffic. | prod00278421 |
71. | An unexpected LACP changed state resulted in the device switching to BACKUP state. | prod00278167 |
72. | Using vADC, generating a new Web Management Certificate caused a panic. | prod00278260 |
73. | After upgrading to version 32.2.3.0, the device constantly rebooted due to a panic. | prod00278289 |
74. | After upgrading to version 32.2.3.50, SSL inspection and ICAP Integration were not working properly. | prod00278451 |
Item | Description | Bug ID |
---|---|---|
1. | Scenarios where the ‘Replace HTTP Reply Messages with Custom Messages’ feature did not function. | DE53496 |
2. | After performing a ‘Revert’ for AppWall in Alteon, you must refresh the page. | DE50247 |
3. | For AppWall in Alteon, in some scenarios, the AppWall page is grayed-out for a brief period while applying a new configuration. | DE51355 |
4. | For AppWall in Alteon, in rare cases, when applying configuration changes, AppWall’s “Login” page is shown and the login will not succeed. In such cases, a restart to AppWall’s service is needed. | DE51346 |
5. | Source Blocking module might not be enforced on IPv6 sources identified using an HTTP Header, as in the case of CDNs. | DE51975 |
6. | Auto Discovery should be set manually to “Resume Auto Discovery” when enabling “Auto Policy Generation” on an already-configured application path in the security policy. | DE52165 |
7. | When using Source Blocking with IPv6 addresses, at least one IPv4 address must exist in the list for the feature to be enabled. | DE49832 |
8. | Rare case leading AppWall to restart. | DE53577 |
9. | Scenarios where the 100-Continue header was not sent correctly by AppWall in Alteon, causing the transaction to fail. | DE53201 |
10. | Rare case when refining parsing properties failed with a server error. | DE53336 |
11. | Event log filters by date may include additional events in some scenarios. | DE54073 |
12. | Rare case that led to the error "Server Error: "Get of FilterAdv/Database failed!" in the WebUI for AppWall in Alteon. | DE51538 |
13. | Scenario where sync fails for AppWall in Alteon. | DE53151 |
14. | AppWall in Alteon does not parse parameters which value contains Emoji Unicode characters. | DE51007 |
15. | LDAP group-based authentication may fail in some scenarios. | DE53520 |
16. | Some scenarios were Redirect Validation was not enforced on specific URL prefixes. | DE53373 |
17. | A Vulnerability security event is wrongly classified as "HTTP Method Violation". | DE53368 |
18. | Wrong title in "Threat" field for FastUpload events. | DE53379 |
19. | LDAP group authentication may fail login in some scenarios. | DE53261 |
20. | Rare case where transactions were blocked while the tunnel Operational Mode is in Bypass. | DE52453 |
21. | Wrong tunnel name reported on Source Blocking events in some scenarios. | DE52002 |
22. | Scenario where Source Blocking stopped blocking blocked sources after a configuration change. | DE52167 |
23. | LDAP attribute cannot be modified when using LDAP group-based authentication. | DE53760 |
24. | A specific type of injection was not detected. | DE53785 |
25. | Scenario where LDAP configuration was not kept after reboot. | DE54019 |
26. | Rare case where an error was shown in WebUI after adding publishing rules. | DE53413 |
27. | Filtering Event Log based on predefined forensics view may not work in some cases. | DE54045 |