Juniper Networks 5XT User Manual

Page of 42
Juniper Networks
NetScreen Release Notes
ScreenOS 5.0.0r9-FIPS
P/N  093-1638-000, Rev. A
Page 19 of 42
• 02551 – An NSRP backup device indicated that a failover occurred 
continuously when no failure on the primary device occurred.
• 02543 – A device rebooted because of an improperly processed checksum. 
• 02542 – When upgrading a Juniper NetScreen-5GT from ScreenOS 4.0.0r4 
to ScreenOS 5.0.0r3, a PPP connection from a Windows XP client to a 
Windows 2000 server stopped working.
• 02536 – The priority value on a WebTrends syslog message varied from 
device to device.
• 02531 – After changing manage options in the Untrust interface with a 
DHCP client configured, the device renewed its IP address with the DHCP 
server, causing loss of configuration of MIPS, DIPs, and VIPs.
• 02509 – A memory leak in the NSRP synchronization process between two 
devices caused some FTP sessions to stop working.
• 02477 – You cannot configure the NSRP Lite feature through the WebUI 
even though you applied an NS-5GT extended key.
• 02457 – The URL request function that sent content to a WebSense server 
sometimes engaged the CPU on a device for too long causing the device to 
reboot.
• 02403 – There was a flaw in the TCP stack buffer which caused the device to 
fail.
• 02390 – When you created an aggregate interface on a Juniper 
NetScreen-5000 system, a CLI get command and an SNMP get operation 
indicated different bandwidth values for the interface. In some cases, the 
CLI command revealed 100 Mbps and the SNMP command revealed 0 MBps.
• 02388 – You could not set the DHCP IP address range through the WebUI 
when detecting an auto-probe. By attempting to perform this operation, the 
system displayed the following message:
The DHCP IP Pool not in the same subnet with gateway/interface
• 02372 – If you ran an OSPF virtual routing instance on a route-based VPN, 
under heavy traffic conditions, the device could continually spawn new 
sessions for the OSPF packets.
• 02369 – You could not change the IKE Authentication user’s password when 
using the WebUI.
• 02362 – In some instances, a TCP session prematurely expired. 
• 02344 – When you tried to bind a PKA key to an administrator account using 
the WebUI, the device generated a trace dump.
• 02342 – An OpenSSH client continued to use password authentication even 
when password authentication was not an option for SSH.
• 02335 – The SNMP iftype value was wrong on the Juniper NetScreen-5XP.