Release Notes System Software Release 6.2.5 BRICK Generation
Release Notes System Software Release 6.2.5 BRICK Generation
Release Notes System Software Release 6.2.5 BRICK Generation
System Software
Release 6.2.5
BRICK Generation
May 2003
Table of Contents
Table of Contents
Important Information
1.1
New Features
2.1
Easy Licensing
10
2.2
13
2.2.1
13
2.2.2
16
2.3
16
2.4
19
2.5
19
2.6
19
2.7
20
2.8
21
2.9
DHCP Client
21
2.10
23
2.11
V.120
26
2.12
27
2.13
32
2.14
33
2.15
34
2.16
35
Changes
36
Release Notes 6.2.5
Table of Contents
3.1
37
3.2
PPTP Improvements
37
3.3
HP OpenView Compatibility
38
3.4
38
3.4.1
38
3.4.2
38
3.5
39
3.6
39
3.7
39
Interdependent Configuration of
PPP Encapsulation, Encryption and Compression
44
3.9
44
3.10
44
3.11
X.25 PAD
45
3.12
45
3.13
46
3.14
46
3.15
46
Bugfixes
47
4.1
48
4.1.1
48
4.1.2
49
4.1.3
50
4.2
50
3.8
Table of Contents
4.3
50
4.4
PPPoE Credits
50
4.5
51
4.6
51
4.7
52
4.8
52
4.9
52
4.10
53
4.11
53
4.12
54
4.13
54
4.14
54
4.15
55
4.16
55
4.17
4.18
56
4.19
56
4.20
SNMP Shell
56
4.21
57
4.22
57
4.23
57
4.24
58
Table of Contents
4.25
4.26
58
Known Issues
59
5.1
59
5.2
59
Important Information
Note that configurations you create with System Software
Release 6.2.5 are not downward compatible! Before updating to
System Software Release 6.2.5, you should save your old configuration so that you can load Release 6.1 again in case a "rollback" is necessary.
Instructions on saving and reloading a configuration with the
Setup Tool can be found in your router manual.
If you implement IPSec configurations with System Software
Release 6.2.5, note that the remote peer to which you want to set
up a tunnel must also run with System Software Release 6.2.5, if
it is a BinTec device.
Note that among the BIANCA/BRICK XM routers only the version with 2 MB of Flash memory and 8 MB of RAM is supported.
If you are using a BRICK XM with only 4 MB of RAM, you can
purchase additional RAM modules from BinTec.
1.1
Update the software on your router. You will find instructions on this in your
router manual.
Important Information
When you update the system software of your router, you should
also consider installing the latest version of BRICKware for Windows on your PC. You can also download this from our Web
server.
New Features
2
2.1
New Features
Easy Licensing
Beginning with System Software Release 6.2.5, BinTec introduces a new system of licensing your hardware and software products. The basic licenses your
router comes with are no longer found in form of a license key, mask and serial
number, but all of them are enabled by default. Only when you purchase additional hardware or software licenses do you have to go through the following
procedure to enable them.
If you happen to delete licenses of the ex works state, proceed as
follows to reactivate them:
Go to LICENSES ADD.
Enter Mask 65535.
Leave all other fields blank.
Confirm with Enter.
The licenses of the ex works state are reactivated.
License Data
The data you need comprise the serial number of your router or your expansion
card respectively, a PIN and a license serial number. Both, the PIN and the license serial number you receive together with the license you purchase. When
licensing online at www.bintec.net, you must enter all of the data, and you will
then receive a key. In the Setup Tool, you enter this key together with the license serial number to enable the license you have purchased.
10
Easy Licensing
Please note that with System Software Release 6.2.5 you must
obtain your license data in the described way. You will no longer
be able to enter license data of the kind you have previously
found on the license data sheet.
Note, also, that additional hardware like expansion cards and
resource modules now require a license. This was not necessary
with older versions of the system software.
Valid licenses that have been entered before updating to System
Software Release 6.2.5, however, will be recognized and you
need not reenter them.
Entering a License
To enter your license proceed as follows:
11
New Features
Available Licenses:
IP (builtin), STAC, CAPI, BRIDGE
Software License ID: X4A2001IWAN0020
Serialnumber
999999
Mask
55
ADD
Key
88PNUPZ
Description
composite
DELETE
State
ok
EXIT
Enter Serial Number (the license serial number you have received upon
purchasing the license), and Key (the one you have received upon
licensing online).
Try again.
If the license state is shown as not_supported, you have entered
a license for a subsystem your router does not support. You will
not be able to make use of the functionality associated with the
license.
12
Disabling a License
Proceed as follows to disable a license on your router:
Go to LICENSES.
Mark the license you want to disable by putting the cursor on it and hit
Space.
2.2
2.2.1
With System Software Release 6.2.5 user authentication on the login shell is
performed through a RADIUS authentication request. The router proceeds as
follows:
When a login name and a password are entered in a login-shell (of e.g.
ISDN Login, Telnet, Console or Minipad), the router checks if a RADIUS
server is configured for login authentication.
If no RADIUS server is configured, it checks the login name and which access level is assigned to it. Next, it checks the entered password and
whether it matches the password configured for the access level. If authen-
13
New Features
tication is successful, access to the shell prompt is granted. If authentication, however, fails the user is presented with a new login prompt.
The following figure illustrates this procedure:
no
yes
RADIUS
reachable and active?
no
admin
write
read
yes
entered password configured
for read/write/admin
community?
send RADIUS
authentication request
no
RADIUS response?
no
yes
yes
RADIUS
accept?
no
new
log-in
prompt
yes
14
shell prompt
Figure 2-1:
no
There are certain mandatory settings for this configuration. Since currently not
all of the variables necessary can be configured in the Setup Tool, the configuration should be carried out in the SNMP shell.
These are the mandatory settings in the radiusServerTable:
The radiusServerPort variable has to be specify the port number used for
transmission of the RADIUS packets. This usually is 1645 for Steel-Belted,
Merit, Cistron, or 1812 for several other RADIUS servers.
Address(rw)
Priority(rw)
State(-rw)
Dialout(rw)
Port(rw)
Timeout(rw)
Policy(rw)
DefaultPW(rw)
00 login
"my_nas_secret4rad_93"
1
enabled
0
172.16.96.93
0
active
disabled
1645
1000
authoritative
"lola"
More than one entries can be created in the table to configure backup servers
if RADIUS authentication is highly preferable over local authentication.
The main benefit of this kind of login authentication is enhanced remote administration possibilities: A centralized data base for administrative router access is
available on the RADIUS server, making it possible to define more than one administrative account per router. Likewise, only one administrative account is
15
New Features
2.2.2
Prior to System Software Release 6.2.5 it was mandatory for PPP authentication during a callback that BinTec specific RADIUS attributes were used to
transmit the necessary protocol/ID/password triple. These settings were then
sent back to the remote access server. This procedure had some drawbacks,
since there were compatibility issues with certain user data bases a RADIUS
server may have to interact with (especially Windows NT), as well as with the
Microsoft IAS RADIUS server. Moreover, with this configuration sensitive data
were sent unencrypted from the RADIUS servers to the remote access server.
All of these drawbacks have been removed. During the callback a second RADIUS request is sent to the RADIUS server to perform the remote authentication. Thus the temporary account data created by the initial authentication need
not be handled with the BinTec specific RADIUS attributes.
2.3
With the concept of a Multiuser WAN Partner, BinTec offers a convenient way
for Internet Service Providers to offer Internet by Call services where multiple
users can dial in using the same ID and password. It is available for PPP connections as well as for PPPoE and PPTP connections; and similarly to a RADIUS procedure it is realized by creating a temporary WAN partner once
authentication has been successful.
16
You can either create a generic WAN partner, called e.g. MultiUser, and then
make the necessary adjustments, or you can make sure to choose the right settings directly upon WAN partner creation.
The following table shows which values are entered in the biboPPPTable while
creating a WAN partner:
inx IfIndex(ro)
Keepalive(rw)
Authentication(rw)
IpAddress(rw)
MaxRetries(rw)
MaxConn(rw)
Layer1Protocol(rw)
Layer2Mode(rw)
DNSNegotiation(rw)
IpPoolId(rw)
02 10001
off
chap
dynamic_server
5
2
data_64k
auto
enabled
0
Type(*rw)
Timeout(rw)
AuthIdent(rw)
RetryTime(rw)
ShortHold(rw)
MinConn(rw)
LoginString(rw)
DynShortHold(rw)
Encryption(rw)
SessionTimeout(rw)
Encapsulation(-rw)
Compression(rw)
AuthSecret(rw)
BlockTime(rw)
InitConn(rw)
Callback(rw)
VJHeaderComp(rw)
LocalIdent(rw)
LQMonitoring(rw)
multiuser
3000
"user"
4
20
1
ppp
none
"geheim"
300
1
disabled
disabled
0
none
0
off
17
New Features
Most of these values serve as examples only, but some are essential for the
configuration of a multiuser WAN partner:
18
2.4
Prior to System Software Release 6.2.5, authentication was only required from
the calling party, but not from the called party (with the exception of negotiated
callback). Mutual authentication must be enabled through the newly created
MIB variable pppExtIfAuthMutual, the default value is 1=disabled (2=enabled). During the LCP (Link Control Protocol) negotiation, the router tries to negotiate and use the same authentication protocol for both authentications.
Mutual Authentication is an integral feature of MS CHAP V2.
Therefore, if MS CHAP V2 is chosen, the pppExtIfAuthMutual
variable need not be set.
2.5
Just as BinTec routers can be used as PPP dial-in servers, they can now be
used as servers for PPPoE connections, too. This function can be enabled in
the PPP menu by setting the value of the PPP Profile Configuration field. It
offers support of static and dynamic WAN partners, RADIUS Accounting, encryption and PPP authentication for PPPoE dial-in interfaces.
2.6
19
New Features
available for NAT. It is useful when much unsolicited incoming traffic has to be
handled, and the originators of the packets need or should not be informed that
the traffic has been blocked. Not informing a packet originator of discarded
packets can be a vital security function if the ports of inactive services are supposed to be in stealth mode.
To enable Silent Deny in NAT, go to IP NETWORK ADDRESS TRANSLATION.
Confirm with SAVE, and in the following menu windows with EXIT.
You have returned to the main menu.
2.7
With System Software Release 6.2.5, there now is a keepalive for encapsulation Multi-Protocol HDLC Framing. Thus the keepalive of Cisco routers operating on the remote side is supported. It is configured through the
biboPPPKeepalive variable in the biboPPPTable. The default value 1 (off)
means that the keepalive is in passive mode. In this mode all received keepalive
packets are answered with a keepalive request, and no checks are performed
upon outstanding remote keepalive requests.
In active mode (biboPPPKeepalive set to 2=on), keepalive requests are sent
by the BinTec router periodically. To avoid flooding the connection, no received
keepalive packets is answered. Outstanding remote keepalive requests are
checked upon, and the interface can be set into the down state, if there are no
remote keepalive requests.
20
DHCP Client
2.8
There is now a Restart Delay Timer that can be configured individually for all
X.25 interfaces. It specifies the time (in milliseconds) to pass between establishment of layer 2 of the X.25 connection and the sending of the restart packet that
initiates establishment of layer 3. Should the router receive a restart packet before it sends one itself, the timer is halted and a restart confirm packet is sent.
The timer is configured through the x25LinkPresetRestDelayTimer variable in
the x25LinkPresetTable. The default value is 0 (a restart packet is sent immediately after layer 2 has been established, the maximum value is 15000).
2.9
DHCP Client
21
New Features
This setting can be made for any Ethernet interface. If you select the value
DHCP in the IP CONFIGURATION field of a menu for configuration of an Ethernet
interface, the menu changes e.g. as follows:
BinTec Router Setup Tool
GmbH
[LAN]: Configure Ethernet
Interface
IP Configuration
Local IP Number
Local Netmask
DHCP MAC Address
Encapsulation
Mode
Bridging
MyRouter
DHCP
000Af000000
Ethernet II
Auto
disabled
SAVE
CANCEL
Although the fields for the local IP address and netmask are still visible, you
cannot make any more changes here.
DHCP MAC Address appears as a new field. Here you enter the MAC address
of the Ethernet interface you are currently configuring. Your router can be
uniquely identified in the LAN using the MAC address, even if it has not yet been
22
assigned an IP address. You do not generally need to make an entry here, the
router uses the MAC address "burnt into" the hardware.
Some providers use hardware-independent MAC addresses to assign their clients IP addresses dynamically. If your provider has assigned you a MAC address, enter this in the relevant field.
2.10
From System Software Release 6.2.5 onwards, channel bundling can be provided by an ISP even if this provider distributes the incoming calls to several
routers: A certain ISDN number is conveyed to the client when he dials in and
requests another B-channel. This is assigned individually for each router at the
central site, so that the calls of several channels over this number are actually
terminated on the same router. The additional B-channel is set up by a type of
callback: The client requests another B-channel. The central site then requests
a call to the individual number of the router to which the client is already connected at this moment.
The client is the active subscriber in this scenario, i.e. he is in
control and responsible for the channel bundling costs. The central site accepts all requests from the client, as long as these
agree with the WAN partner configuration of the router.
The following new parameters have been introduced:
23
New Features
Configuration of pppDialProfileTable
The configuration of the parameters contained in this table is only necessary on
the server side and is not integrated in the Setup Tool. Configuration must be
carried out in the SNMP shell.
The pppDialProfileTable contains the following variables:
Variable
Bedeutung
Index
Descr
BapNumber
BapSubAddress
BapLkType
StkMask
CallbackL1Prot
Table 2-1:
24
pppDialProfileTable
The following settings are necessary for configuration of this service on the central site:
For BapNumber, you must enter a number that is assigned to this router only. This is conveyed to the client for "callback" purposes.
Configuration of pppExtIfTable
The variable pppExtIfBodMode must be configured on both, the server and client. This can be done in the Setup Tool. The variable pppExtIfDialProfileIndex
must be configured on the server.
Server settings:
Client settings:
The variable pppExtIfBodMode in the pppExtIfTable must be set to
bap_client.
This is done in the WAN PARTNER ADD/EDIT ADVANCED
SETTINGS EXTENDED INTERFACE SETTINGS (OPTIONAL) menu by setting
the value of the Mode field to BAP, Dialup Client Mode.
25
New Features
2.11
V.120
V.120 is used for dialing in to a router with a mobile phone. HSCSD is used for
connecting the mobile phone to the telephone providers switch and V.120 for
the ISDN connection from the telephone provider to the router. V.120 thus fulfills
largely the same purposes as V.110, but permits higher transfer speeds.
No specific configuration is necessary for using V.120 for incoming calls: The
router detects the protocol automatically and handles the packets accordingly.
However, the router cannot use V.120 to call a mobile phone, which is possible
with V.110.
If you operate you router with a private branch exchange, it may happen that the
exchange falsifies the service used for an incoming call. To obviate this problem, a MSN (Multiple Subscriber Number) can be dedicated to the V.120 service in the menu WAN INCOMING CALL ANSWERING. All calls arriving at this
MSN are treated as V.120 calls.
If you want to configure a WAN partner on your router that responds exclusively
to V.120 calls, you can set this appropriately during the configuration of this
WAN partner in WAN PARTNER ADD: Set the value for the Encapsulation
field to Async PPP over V.120 (HSCSD). Bear in mind that only V.120 connections are then possible over this interface.
26
2.12
System Software Release 6.2.5 offers an extension of BinTecs NAT implementation, which simplifies NAT configuration for networks with more than one external IP address. Previously only single IP addresses could be translated and
the translation of several IP addresses involved increased configuration effort.
System Software Release 6.2.5 introduces two new variables, ExtMask in the
ipNat Out Table and IntMask in the IP NatPresetTable. These make it possible to translate entire IP networks. This is relevant if you are assigned more than
one IP address from your provider. Using the new variables, the IP addresses
of a global IP address pool, e.g., can be translated to the local addresses of the
LAN. It is necessary to ensure that the IP addresses calculated by the router
from the netmask entered actually are within the address range of the LAN.
The configuration can be made in the Setup Tool using the menus IP
NETWORK ADDRESS TRANSLATION EDIT REQUESTED FROM OUTSIDE
ADD/EDIT and REQUESTED FROM INSIDE ADD/EDIT.
The menu for incoming connections is shown below:
BinTec Router Setup Tool
BinTec Access Networks GmbH
[IP][NAT][EDIT][OUTSIDE][EDIT]: NAT - sessions from OUTSIDE MyRouter
Service
Protocol
user defined
any
Remote Address
Remote Mask
External Address
External Mask
External Port
2.3.4.0
255.255.255.240
any
Internal Address
Internal Mask
Internal Port
192.168.1.0
255.255.255.240
any
SAVE
CANCEL
27
New Features
The Setup Tool menus permit very accurate configuration. The following settings can be made:
Field
Meaning
Service
ftp
telnet
smtp
domain/udp
domain/tcp
http
nntp
user defined (if you do not use any of the
predefined services)
28
Field
Meaning
Protocol
icmp
tcp
udp
gre
esp
ah
l2tp
any
Remote Address
Optional.
IP address of the host or group of hosts in the
remote network.
Only packets from this host/group are accepted
for incoming connections.
Remote Mask
29
New Features
Field
Meaning
Remote Port
any
specify
specify range
Remote Port: Port
External Address
External Mask
30
Field
Meaning
External Port
any
specify
specify range (only in
REQUESTED FROM
Internal Address
Internal Mask
31
New Features
Field
Meaning
Internal Port
any
specify
Internal Port: Port
Table 2-2:
2.13
From System Software Release 6.2.5 onwards, the ICMP messages sent by
the router can be configured in the ipIcmpTable. The default behavior has not
been changed over previous versions. You should only change the default settings if you have problems with the ICMP behavior of your router.
32
enabled
enabled
enabled
enabled
enabled
tcp_rst
enabled
enabled
enabled
2.14
BinTec routers can calculate routes using both RIP (Routing Information Protocol) and OSPF (Open Shortest Path First; with the exception of
BIANCA/BRICK XL, this requires a valid license). You can free resources by
disabling the RIP/OSPF process. This is advisable if neither RIP nor OSPF are
used and if synchronization of the RIP/OSPF process to the interface or routing
tables is not necessary.
The process could previously only be disabled via the configuration of several
variables either protocol-specific or interface-specific. The new variable
33
New Features
2.15
System Software Release 6.2.5 offers the facility for creating an access schedule (weekly schedule) for each dialup WAN partner to control when and for how
long connections can be set up over this interface. This schedule is created in
the WAN PARTNER ADD/EDIT WEEKLY SCHEDULE menu. Here you can
activate or deactivate the surveillance.
If you activate the surveillance (Surveillance on), the following menu appears:
BinTec Router Setup Tool
GmbH
[WAN][ADD][SCHEDULE]: Weekly Schedule
Surveillance
on
(S)un:
[00:00-24:00] [
] [
] [
(M)on:
[00:00-24:00] [
] [
] [
(T)ue:
[00:00-24:00] [
] [
] [
(W)ed:
[00:00-24:00] [
] [
] [
T(h)u:
[00:00-24:00] [
] [
] [
(F)ri:
[00:00-24:00] [
] [
] [
S(a)t:
[00:00-24:00] [
] [
] [
SAVE
CANCEL
For each day of the week, you can define four time windows in which a connection can be set up to this WAN partner. When the end of the configured time in-
34
2.16
Hold/Retrieve
ECT (Explicit Call Transfer)
Call Forwarding
Call Deflection
The supplementary services are executed in the exchange of the telephone network operator or in an intermediate telephone system.
35
Changes
Changes
Interdependent Configuration of PPP Encapsulation, Encryption and Compression (chapter 3.8, page 44)
36
PPTP Improvements
3.1
3.2
PPTP Improvements
BinTecs PPTP implementation has been improved to be fully RFC 2637 compliant. This also solves a number of problems that have been verified with earlier versions of our System Software.
37
3
3.3
Changes
HP OpenView Compatibility
3.4
3.4.1
3.4.2
For each RADIUS server in an inactive state, a periodical alive check was conducted. When a server was down for a longer time, this may have caused undesirable costs, if the server was reachable through a dial-up connection only.
A new variable (radiusServerKeepalive has been created in the
radiusServerTable). If switched to enabled (1=the default value), the keepalive
ping will be sent every 20 seconds, if disabled (2), the RADIUS server state will
not be set to inactive, and accordingly no keepalive packets will be sent. The
keepalive can also be configured through the Alive Check (if inactive) field the
IP RADIUS SERVER EDIT menu.
38
3.5
For a considerable time, CAPI 2 has now been the CAPI standard most
commonly used. Only few applications remain that use or are able to use
CAPI 1.1. BinTec will, therefore, not continue to develop, maintain or update the
CAPI 1.1 implementation of our system software.
3.6
If the variable pppExtIfMtu in the pppExtIfTable is set to any integer other than
0, the value for the Maximum Transmit Unit (MTU) size negotiated during connection establishment is overwritten once the connection is established. Otherwise the size of the MTU depends on the information the remote partner sends
on its MRU (Maximum Receive Unit) size. Where this information is unavailable
the MTU is set to a default size of 1500.
Likewise, a value for the MRU can be configured through the variable
pppExtIfMru.
Since entries in the pppExtIfTable are entirely optional for WAN
partner configuration, configuration of the MTU and MRU values
may be unavailable for some or even for all interfaces. In these
cases LCP negotiation starts with a default MRU value of 1524.
3.7
39
Changes
There is no encryption configured by the local partner, but the remote partner requires encryption during connection establishment. As there is no
RFC-conform way to terminate the connection in this case, both routers
must be BinTec routers for the interface to be blocked.
CHAP
MS-CHAP V1
MS-CHAP V2
MPPE V1/V2 40
MPPE V1/V2 56
DES 56
Blowfish 56
3DES 168
Blowfish 168
40
Table 3-1:
MPPE V1/V2 40
MPPE V1/V2 56
DES 56
Blowfish 56
3DES 168
Blowfish 168
Table 3-2:
The next set of tables displays the conditions under which a connection is either
established or blocked.
The first table displays the combinations of MPPE V1 and other encryption
methods:
MPPE V1 40
MPPE V1 40
MPPE V1 56
MPPE V1 128
41
Changes
MPPE V1 40
MPPE V1 56
MPPE V1 128
MPPE V1 56
MPPE V1 128
MPPE V2 40
MPPE V2 40
MPPE V2 56
MPPE V2 56
MPPE V2 128
MPPE V2128
DES 56
3DES 168
Blowfish 56
Blowfish 168
Table 3-3:
MPPE V2 56
MPPE V2 128
MPPE V1 40
MPPE V2 40
MPPE V1 56
MPPE V2 56
MPPE V1 128
MPPE V2 128
MPPE V2 40
MPPE V2 56
42
MPPE V2 40
MPPE V2 56
MPPE V2 128
MPPE V2 128
DES 56
3DES 168
Blowfish 56
Blowfish 168
Table 3-4:
The last table displays the combinations of encryption methods other than
MPPE:
DES 56
3DES 168
Blowfish 56
Blowfish
168
MPPE V1 40
MPPE V1 56
MPPE V1 128
MPPE V2 40
MPPE V2 56
MPPE V2 128
DES 56
3DES 168
Blowfish 56
Blowfish 168
Table 3-5:
43
3
3.8
Changes
Interdependent Configuration of
PPP Encapsulation, Encryption and
Compression
To avoid inconsistent configurations when using the Setup Tool, the choices
available for encryption and compression in the WAN PARTNER EDIT menu
are now reduced according to previous choices. Combinations that would not
be available are no longer shown in the Setup Tool.
3.9
With System Software Release 6.2.5, a password for the Activity Monitor has
been introduced. It is needed to set any interface of a monitored router into an
up or down state respectively. As long as no Activity Monitor password is configured on your router, you need the admin password to do so.
The Activity Monitor password is configured in SYSTEM PASSWORD SETTINGS.
Enter a password of your choice in the Activity Montor Password field, then
confirm with SAVE twice to return to the main menu.
3.10
According to RFC 1812 link level broadcast packets must be discarded if they
are not directed towards an IP multicast address. With System Software
Release 6.2.5, BinTec routers follow this recommendation. This also fixes a
problem that occurred when IP routing was configured on two Ethernet interfaces and bridging was then enabled on these interfaces. The router rebooted at
the arrival of the first IP broadcast packet. Since link level broadcast packets are
now discarded, this will no longer happen.
44
3.11
X.25 PAD
3.12
Three new values have been created for the variable biboAdmSnmpVersion,
version1p1, version1p1_compat and version1p1_auto. Version 1p1 strongly improves the compatibility of the BinTec SNMP implementation with SNMP managers like HP OpenView.
Note that the default setting is version1p1_auto from System
Software Release 6.2.5 onwards. Version 1p1 is used in this setting if possible. Otherwise version 1p1 is used in Compatibility
Mode (version1p1_compat).
If you use SNMP managers like HP OpenView, you should
change the value of biboAdmSnmpVersion in existing configurations and set to version1p1_auto.
45
3
3.13
Changes
If the ps command is used in the SNMP shell, all time information (time,
ktime, utime) is now given down to one hundredth of a second.
3.14
If the default interface for a packet to be routed was inactive (dormant, down
or blocked), but a backup interface existed for this packet, it was previously
not possible to show this backup interface with the rtlookup command. This
is now shown with the -r option when it is used.
3.15
Alcatels implementation of PPTP/GRE (Point-to-Point Tunnelling Protocol/Generic Routing Encapsulation) can lead to incorrect "acknowledgment numbers"
and thus PPTP interfaces may be blocked.
The following workaround has been implemented: There is now a configurable
timer (pptpProfileMaxBlockTime, the value is entered in milliseconds up to
10000): A blocked PPTP connection as well as the associated control connection over TCP port 1723 are terminated after time-out. Otherwise attempts to restore the connection to the opposite Alcatel station could fail.
46
Bugfixes
Since System Software Release 6.2.5 is a release for all routers of the
BRICK-Generation, the problems and their solution described here do not relate
to a single router type or to a certain system software release only.
The following problems have been solved:
47
Bugfixes
4.1
4.1.1
If a configuration was saved while there were active (temporary) RADIUS interfaces, these were saved as static entries. Upon a reboot these entries were
handled as presets and several problems could occur. Thus false numbers may
have been dialed with enabled callback, or the false information was requested
from the RADIUS server.
This problem has been solved. Now the following tables are checked for interface numbers that are associated with temporary RADIUS interfaces:
ifEntryTable
ipExtIfEntryTable
48
ipRouteEntryTable
ipExtRtEntryTable
ipExtRtEntryTable
ospfIfEntryTable
pppExtIfEntryTable
biboPPPEntryTable
biboDialEntryTable
pppExtIfEntryTable
ipNatPresetEntryTable
ipQoSEntryTable
qosIfEntryTable
qosPolicyEntryTable
No data found in these tables will be saved for interfaces with index numbers
associated with RADIUS.
4.1.2
With a BinTec router used for RADIUS accounting, the Framed-IP-Address attribute was missing in the Accounting Start Packet if the IP address was assigned from a local IP address pool by the router. Some service providers,
however, need this information for accurate accounting.
This problem has been solved, the Framed-IP-Address attribute is now transmitted.
49
4
4.1.3
Bugfixes
The radiusServerReloadInterval variable was defined as a duration in minutes, but was handled as a value for seconds.
This problem has been solved, the value of the variable is now interpreted as
being in minutes.
4.2
If an ADSL connection attempt via PPTP failed permanently, and if the interface
was configured as a flatrate interface (i.e. with Short Hold -1), 88 bytes of memory were lost with each failure.
This problem has been solved.
4.3
4.4
PPPoE Credits
50
the pppoeTotalOutDuration variables in the pppoeCreditsTable were not updated. Therefore, the credits control did not work.
This problem has been solved, the credit counters are now updated correctly.
4.5
No channel bundling was possible when using a Cisco 4500 for dial-in to a BinTec router with inband authentication. This was due to a faulty implementation
of the LCP (Link Control Protocol) negotiation routine. It lead to configuration rejects concerning the Multilink Endpoint Discriminator (used for Always On/Dynamic ISDN). The same option was sent again with the next LCP configure
request, so that the LCP layer was never established.
This problem has been solved, the Multilink Endpoint Discriminator is sent only
if requested by the remote partner.
4.6
The MTU size of PPP dial-up interfaces was miscalculated when encapsulation
was set to PPP, Async PPP over X.75 or Async PPP over X.75/T.70/BTX, as
well as for all layer 1 protocols except PPPoE, PPTP PNS and PPP over PPTP.
This was due to a erroneous calculation of the received remote MRU/MRRU to
the value of -4. This may have caused unnecessary fragmentation of packets.
This problem has been solved, and the MRU/MRRU size value received from
the remote partner will be interpreted correctly, so that the MTU size can be determined adequately.
51
4
4.7
Bugfixes
4.8
When encryption was set to MPPE (any key length) and authentication to MSCHAP version 2, a PC running Windows NT or Windows 2000 was unable to
access the LAN. This behavior was created by a faulty implementation (due to
the CBCP protocol provided by Microsoft) which caused a wrong calculation of
the initial encryption keys on connections between a BinTec router and a Windows PC.
This problem has been solved, the implementation was corrected and keys are
calculated correctly now.
4.9
If there was a port scan on port 1723 which is used for tunneling connections
(VPN), the router froze if no valid VPN license is available.
This problem has been solved, and the router now ignores scans on port 1723
if no VPN license is enabled.
52
4.10
With a fragment size greater than the MTU value of the destination interface,
and the "Dont Fragment Bit" set in the IP header, the packet fragments cannot
be delivered and an ICMP Fragment Unreachable message is sent back to the
packet originator.
If, however NAT is configured on the destination interface, the NAT procedure
is performed before the MTU check, and thus the original source IP address
was lost. Accordingly, the ICMP message could not be sent to the fragment
originator, which had the effect that the path MTU discovery was impossible.
This problem has been solved, and the original source IP address is now retained.
4.11
Established PPP connections were terminated by the BinTec router if the remote partner required an additional CHAP (including MS-CHAP) authentication.
Since RFC 1994 recommends that CHAP challenges should be sent while a
connection is active, this behavior was undesirable.
The problem has been solved, and the PPP authentication routine now works
in accordance with RFC 1994.
53
4
4.12
Bugfixes
Some CAPI applications did not receive the DDI (Direct Dial In) called party
number information, making it impossible to assign incoming calls to specific
CAPI users. This problem was due to an unwanted reaction to a Listen request
sent by the application.
This problem has been solved, the DDI information is now transmitted properly.
4.13
When a CAPI application using the X.25 protocol tried to open more than one
logical channel, the connection was refused.
The problem has been solved, it is now possible for CAPI applications to open
more than one logical channel.
4.14
Each time a DNS request was successfully answered (either positively or negatively), the reference number of the relevant MIB was increased, consuming
memory.
This problem has been solved.
54
4.15
With a BinTec router acting as DHCP server certain actions or situations could
cause either a stacktrace or a freeze.
These problems have been solved, and IP address requests are now handled
properly after a reboot.
4.16
Under certain conditions the router froze, printing the error message dl_look
len:0 to the serial console. This behavior was due to incorrect handling of receive-buffer-too-small conditions.
The problem has been solved, the mentioned conditions will now be handled
properly.
4.17
The ipExtIfRipSend variable could not be set to ripV2mcast with the Setup
Tool. With System Software Release 6.2.5 it is possible to set the RIP Send
field in the ETHERNET ADVANCED SETTINGS menu to RIP V2 multicast.
Moreover, RIP V2 messages were sent to the IP address 224.0.0.9 in compliance with RFCs 1388 and 1723 when RIP V2 Multicast was enabled, but they
were sent as MAC broadcast instead of Link Level multicast packets. System
Software Release 6.2.5 now complies with RFC 1812 and forwards IP multicast
packets as Link Level multicasts.
55
4
4.18
Bugfixes
On some routers bridging was not possible, even if covered by the available licenses.
This problem has been solved, and bridging is now fully functional.
4.19
With System Software 6.1.2, BinTec routers were susceptible to a bug in the
SNMP protocol in connection with processing SNMP requests. Under certain
circumstances, this bug could be utilized to cause our routers to crash or reboot.
Further information and a description for working around the bug
can be found at:
http://www.cert.org/advisories/CA-2002-03.html.
4.20
SNMP Shell
56
4.21
When the syslog level of the router was set to the value debug, the system
crashed as soon as all-zero packets arrived. This problem was caused by an
error in the syslog messages.
The problem has been solved.
4.22
If a closed user group was entered at a service provider to control ISDN calls, it
was possible that the calls were not allowed. This happened when the information about the members of the user group was still to be transferred by the service provider, but evaluated in the router. The router evaluated information
incorrectly, so that calls from the user group were no longer detected and therefore rejected.
The problem has been solved. The information on the user group is processed
correctly.
4.23
PMTU (Path Maximum Transfer Unit) Discovery was not operational if IP accounting was activated on a router at the same time.
This problem was caused by the PMTU Discovery mechanism not assuming
that fragmented packets are assembled on the path (e.g. due to NAT or Access
Control). Problems are therefore caused with the "Dont Fragment Bit", which is
used to mark smaller units than the calculated PMTU.
The problem has been solved: The "Dont Fragment Bit" is now deleted on assembling the packet fragments.
57
4
4.24
Bugfixes
4.25
It was not possible to change back to an older release after carrying out an update to System Software Release 6.2.5.
This problem was caused by the write protection of System Software
Release 6.2.5. Older software versions are no longer able to modify data created by the newer software.
The problem has been solved. The BOOTmonitor and update shell check the
software version and only version 6.2.x software is protected.
4.26
58
Known Issues
A number of errors still persists in System Software Release 6.2.5. We try hard
to resolve any remaining issues as fast as possible. As soon as any improvements have been made to the software, they will be made available on our webserver. Please watch www.bintec.net for software updates.
The following issues are known to us:
PAP Authentication with an ACE RADIUS Server (chapter 5.1, page 59)
Windows 2000 128 Bit MPPE (chapter 5.2, page 59)
5.1
5.2
59
60
Known Issues