Cisco WRVS4400Nv2 Router Firmware 2.0.2.1
Dateityp: Firmware.
Betriebssystem: AnyOS.
Dateiname: WRVS4400Nv2_v2.0.2.1.img.
Bit: 32/64 Bit.
Lizenz: Kostenlos.
Beschreibung
The following updates were made in firmware version 2.0.2.1:
– Updated the text of the Note field on the Wireless > WDS window.
– Added a logout link to the Home page.
– Updated the Firewall > Internet Access Policy window so that when a user adds an allow-rule policy, the user can only add allow rules to the policy, but not deny rules.
– Updated the Internet access policy so that it supports overnight scheduling.
The following problems were fixed in firmware version 2.0.2.1:
– The DHCPv6 section of the Setup > LAN section does not reflect the correct DHCPv6 starting and ending IP pool addresses.
– If the PPPoE username or password include special characters, the PPPoE connection fails.
– The Firewall > Internet Access Policy window displays the wrong message when you change Deny to Allow.
– Internet filtering does not work if GET and HOST are split.
– Messages prompting the user for acknowledgment display a YES button instead of an OK button.
– No example of a forbidden domain construct in the GUI.
– The Approved URLs list displays an incorrect example of the syntax of a URL.
– Typo in the error message that is displayed when entering an IP addresses that is already in the Approved Clients list.
– No validation for the IP address ranges in the Approved Clients list.
– There is an issue in the process of generating random certificates.
– In the L2 Switch > VLAN window, highlighting all VLANs (2–4) and deleting VLAN ranges is misleading because some of the selected items remain in the list.
– Rebooting the router causes clients on non-default VLANs to lose their IP addresses and acquire IP addresses from the default VLAN (1).
– The broadcast IP address should not be allowed as the Gateway address when adding route.
– Incorrect error message displayed when adding a duplicate static route.
– Daylight savings time is incorrect for Time Zone GMT -6 (Central Time US and Canada).
– User cannot use the WAN IP address to locally access the GUI using HTTPS.
– SMTP update is needed so that the user can enter the port number.
– HTML tags are displayed when the Disconnect button is clicked on the Summary window.
– Fixed several web interface vulnerabilities that could be exploited by a remote, unauthenticated user. For more information, see the following Cisco Security Advisory:
Download