FVS318N Firmware Version 4.3.2-7
Bug Fixes:
- When the router static route is private ,it also sends the static route in RIP
- Allows to use the bandwidth profile for a schedule based firewall rule
- Fixed Device is vulnerable for POODLE SSLv3 vulnerability (CVE-2014-3566)
- Fixed Device is vulnerable for CVE-2014-3568
- SNMP node "nlogSyslogState" should be editable
- No DHCP server log and help page missing
- On SSL VPN Client page, start IP can't be greater than End IP
- nsysConfFileServerIP nsysFirmwareMgmtServerIP can be set to a wrong IP
- [CLI]Client routes added from SSL_VPN Wizard are not reflecting in both GUI and CLI
- Unable to access GUI after adding static route with private enabled
- IPSec VPN to client: VPN cannot establish when "Remote IP" select "Range"
- Start port cannot be equal to End port when define a service
Know Issues and Limitations:
- Unable to add IP address on the network in source IP address page
- Observed inconsistent behavior with voice traffic when server is lying in LAN and DMZ side
- Device showing blank certificate when subject name is having successive comma
- For the port speeds 10Base T FULL_Duplex and 100Base T FULL_Duplex, the duplex setting is showing as half
- [CLI]Able to add 2 mode config records with same pool start ip and end ip
- Device is accepting same Local and Remote LAN IP in manual tunnel.
- When "Disable Ping Reply on LAN Ports" is enabled the WAN ip of router is not reachable from the LAN host
- No NAT translation of SIP headers during REGISTER, outbound call and SDP
- There is no validation for SIIT Address field.
- IPv6 IPSec client tunnel is not getting establish in main mode.
- Device is not accepting the static route for the network 0.0.0.0 on LAN or VLAN interface.
- [IPv6]Unable to run IPERF-UDP and FTP traffic from LAN to WAN on SIIT tunnel.
- Stun packets are getting drop in SIP module
- Device IPv6 WAN is not getting RADvD IP address when Router's MAC Address is configured for "Use this computer's MAC Address" or "Use this MAC Address".
- [CLI]There are no proper validations for the domain name in CLI
- [CLI]schedules are not getting edited properly from cli
- Able to see wireless logs with "local wireless" tag and with "kernal kernal" tag
- After Successful connection through WPS PIN method, status message is not correct
Note: it supports up to 50 VoIP calls
To Upgrade
IT IS VERY IMPORTANT TO NOT POWER-CYCLE THE UNIT BEFORE THE UPGRADE COMPLETES! IF YOU DO INTERRUPT THE UPGRADE, THE ROUTER WILL BE RENDERED USELESS!
- Download and extract the new firmware to a convenient place such as your desktop. The filename after extracting is FVS318N_v4.3.2-7.img
- Using a browser, login to the router as admin.
Note: Reboot the firewall before beginning the update process.
- Select Administration > Settings Backup and Firmware Upgrade from the main/submenu.
- In the Router Upgrade section, click Browse.
- Locate the downloaded file and click Upload.
This will start the software upgrade to your VPN firewall. During the upgrade process, the Settings Backup and Firmware Upgrade screen remains visible and a status bar shows the progress of the upgrade process. The upgrade process can take up to 10 minutes. When the status bar shows that the upgrade process is complete, it can take another 10 minutes before the wireless VPN firewall reboots.
- When the reboot process is complete, log in to the wireless VPN firewall again. (If you can see the unit: The reboot process is complete when the Test LED on the front panel goes off.)
- Select Monitoring. The Router Status screen displays, showing the new firmware version in the System Info section of the screen.