■
For source NAT, the ip address displayed in log should be 4.0.0.0->0.0.0.0.
[PR/505454]
Power over Ethernet (PoE)
■
On SRX240 and SRX210 devices, the output of the PoE operational commands
takes roughly 20 seconds to reflect a new configuration or a change in status of
the ports. [PR/419920]
■
On SRX210 and SRX240 devices, the
deactivate poe interface all
command does
not deactivate the PoE ports. Instead, the PoE feature can be turned off by using
the
disable
configuration option. Otherwise, the device must be rebooted for the
deactivate setting to take effect. [PR/426772]
■
On SRX210 and SRX240 devices, reset of the PoE controller fails when the restart
chassis-control command is issued and also after system reboot. PoE functionality
is not negatively impacted by this failure. [PR/441798]
■
On SRX210 PoE devices managing AX411 Access Points, the devices might not
be able to synchronize time with the configured NTP Server. [PR/460111]
■
On SRX210 devices, the fourth access point connected to the services gateway
fails to boot with the default Power over Ethernet (PoE) configuration. As a
workaround, configure all the PoE ports to a maximum power of 12.4 watts.
Use the following command to configure the ports:
root#
set poe interface all maximum-power 12.4
[PR/465307]
■
On SRX100, SRX210, SRX240, and SRX650 devices, with factory default
configurations the device is not able to manage the AX411 Acess Point. This
might be due to the DHCP default gateway not being set. [PR/468090]
■
On SRX210 PoE devices managing AX411 Access Points, traffic of 64 bytes at
speed more than 45 megabits per second (Mbps) might result in loss of keepalives
and reboot of the AX411 Access Point. [PR/471357]
■
On SRX210 PoE devices, high latencies might be observed for the Internet Control
Message Protocol (ICMP) pings between two wireless clients when 32 virtual
access points (VAPs) are configured. [PR/472131]
■
On SRX210 PoE devices, when AX411 Access Points managed by the SRX devices
reboot, the configuration might not be reflected onto the AX411 Access Points.
As a result, the Ax411 Access Point retains the factory default configuration.
[PR/476850]
Security
■
On SRX3400, SRX3600, SRX5600, and SRX5800 devices, the egress filter-based
forwarding (FBF) feature is not supported. [PR/396849]
■
On SRX210, SRX3400, SRX3600, SRX5600, and SRX5800 devices in a chassis
cluster, if the Infranet Controller auth table mapping action is configured as
provision auth table as needed
, UAC terminates the existing sessions after Routing
Engine failover. You might have to initiate new sessions. Existing sessions will
154
■
Issues in JUNOS Release 10.1 for SRX Series Services Gateways and J Series Services Routers
JUNOS 10.1 Software Release Notes