
New features added in this release (Not all features are in all
products – see their respective Data Sheets):
Split DNS support under Network Settings -> DNS Configuration -> DNS Settings.
Content Filtering can now work with HTTPS as well as HTTP
(2100) Application ID’s can now be used to match QoS rules
Multiple Serial Port Redirector support. At the CLI, if a multi-port USB-to-Serial Port adapter
is connected to the product, the ports can be individually selected as “serial 1”, “serial 2”,
etc. Only one port is available at a time.
Ability to send a Break command to a device attached to a serial port. Using the “serial”
command at the CLI, a Ctrl-X will send a Break command to the attached device.
CLI access via device web UI under System Settings -> System Control -> Device Control.
This allows easy access to the router’s CLI, including the ‘serial’ command.
(IBR1100) WiFi-as-WAN WPA2 Enterprise for 2.4GHz radio. This allows connection to a
Access Point using WPA2 Enterprise authentication.
LLDP. Added Model Name and Firmware Revision to the LLDP string.
SSH. We limited the server cipher list to this subset: aes128-ctr,aes192-ctr,aes256-ctr
Security defects fixed:
HTTP Proxy support was added in the 5.3.0 Release as part of Content Filtering. This
added a firewall rule that allowed traffic to go to the Proxy when Content Filtering was
enabled. This rule was too open and allows use of the Proxy.
HTTP Proxy was patched to mitigate CVE-2015-1031. There are no known exploits for that
vulnerability.
Default GRE firewall rules allowed configured tunnel route destinations to be reached by a
carefully-crafted packet injected from other interfaces on-link with the WAN. This does not
affect typical Internet WAN connections such as modem, DSL, or cable modem. This can
only be exploited across an Ethernet WAN.
Additional UI/Usability changes:
LPE, E products. Rather than displaying the modem firmware version, the modem package
version now displays for more accurate update notification.
Defects fixed:
Management Address field in LLDP did not match the Admin Access address for the
interface.
LLDP Wireless LAN always reported as off
5.3.0 GPS migration missed the “always_poll” flag
Zscaler Internet Security improved the failover and failback abilities
“*” was not allowed in Webfilter Rules
Comentários a estes Manuais