Cisco Cisco SA520 Security Appliance
![Cisco](https://files.manualsbrain.com/attachments/7380d0050044647c30f5c24bbbf5d0c0b6d9bb84/common/fit/150/50/faa183d287233c52228cfea3dbc2a127fe780f60564fcb0955d9c3d1cd23/brand_logo.png)
Release Notes for SPA9000 Voice System Firmware Version 6.1
1
Release Notes
Release Notes for SA 500 Series Security
Appliances Firmware Version SA500-K9-
1.0.14
Appliances Firmware Version SA500-K9-
1.0.14
June 2009
These Release Notes describe the known issues in the SA 500 Series Security
Appliances firmware version SA500-K9-1.0.14.
Appliances firmware version SA500-K9-1.0.14.
Contents
This document includes the following topics:
•
•
Known Issues
•
The security appliance is unable to establish a VPN tunnel using Greenbow
VPN Client in Main Mode with XAUTH authentication. To work around this
issue, choose Aggressive Mode instead of Main Mode when configuring the
IKE policies on the VPN > IPSec > IKE Policies > IKE Policy Configuration
page. (CSCta16305)
VPN Client in Main Mode with XAUTH authentication. To work around this
issue, choose Aggressive Mode instead of Main Mode when configuring the
IKE policies on the VPN > IPSec > IKE Policies > IKE Policy Configuration
page. (CSCta16305)
•
The Uptime counter for WAN ports on the Status > Device Status > Port
Statistics page is not always accurate and may not match the system up
time. There is no work around at this time. (CSCsx57782)
Statistics page is not always accurate and may not match the system up
time. There is no work around at this time. (CSCsx57782)
•
After the RADIUS server IP address is configured on the Administration >
Radius Server > Radius Server Configuration page, the IP address cannot
be modified. There is no work around at this time. (CSCta16319)
Radius Server > Radius Server Configuration page, the IP address cannot
be modified. There is no work around at this time. (CSCta16319)