
Network Security Platform v5.1
Page 7
700-2014C00
Release Notes
Medium severity Manager software issues
ID # Issue
528070
In the Threat Analyzer Port Throughput utilization monitor, the mouse-over summary displays an
incorrect data when the value is greater than 2Gbps.
527307 The UDS Editor alters the OFFSET and DEPTH field values when the signature is saved.
525977 The dbtuning.bat file does not work on some Windows systems.
525684
In the Real-time Threat Analyzer, the ‘Does not equal’ condition for filtering IPs under the Display Filter
criteria does not work correctly.
523609 Unable to upload the logon banner from a path that has non-English characters.
519680
Unable to choose the default policy at the time of editing a child domain if the policy was created at the
child domain level.
501666 The scheduled backup process is running on a daily basis when configured as weekly.
499588 The modification time of unacknowledged faults is modified after a restart of the Manager service.
493200 The status for an offline signature set download is displayed as "In progress" for a long time.
3 Known outstanding issues
The following tables contain the known, outstanding issues for this release of Network Security Platform 5.1.
3.1 Known Sensor software issues
High severity Sensor issues
ID # Issue Workaround
526382 Rate limiting does not work on M-8000 S ports. None
Medium severity Sensor issues
ID # Issue Workaround
432648
[NAC] When multiple interfaces are active on a host simultaneously, and
a single Sensor sees traffic from the same host, NAC can be done only
on traffic from one of the interfaces.
Ensure that your NAC
configuration is enabled for only
one interface on the Sensor.
432067
[McAfee NAC] The OS information for MAC hosts are displayed as
“Unknown” instead of “Unmanageable”.
None
422502
Fragmented packets within tunneled traffic are dropped when both inner
and outer headers are fragmented.
Disable tunneling using "set
parsetunneledtraffic
disable"
426038 ACLs do not work when applied to tunneled traffic. None.
423144
Attack detection does not work for tunneled flows containing MPLS or
double VLAN tagged packets.
None.
394083
When TACACS+ is used with a 64 character encryption key, remote
authentication fails.
Use a key of 63 characters or
less.
391706
Only in the case of copper SFPs set to 1Gbps w/auto-negotiation, ports Reconfigure using ISM to
Commentaires sur ces manuels