3. When device is writing flash, all the interrupt/service will be stopped. (Firmware
upload and signature update for full version will take tens of seconds)
4. Because of the memory shortage (ZW5/P1), device have to restart when customer
need to upgrade firmware sometimes.
Issues
[ALG]
1. H323 does not support the server in LAN topology.
2. Currently, we do not support NAT loopback on SIP registration or proxy server,
which means if your SIP client is located on LAN, your registration server address
cannot use ZyWALL WAN IP to do loopback to SIP server which located on LAN.
(1) NAT loopback for SIP server on LAN.
(2) Client A(WAN) call Client B(LAN) using LAN’s IP, and the reversed way. That
is you should call phone number directly to each other without the IP address.
There issue will be improved for future plan.
(3) Device can support direct ACK/BYE sip request, but for the following topology
Client_A----SIP Server----- (L) ZW_1 (W) ----- (W) ZW_2 (L) ---- Client_B
(Client/Server) ------ (LAN) DUT (WAN) ---- (client)
Stop calling from answer client, the calling can’t terminate normally.
[Anti-Spam]
1. Mail cannot pass through 2 devices with Anti-Spam enabled.
2. Customer need to turn off the redundant check for AS and AV for gathering more
CPU resource or CPU will always reach 100%. When CPU reaches 100%, the AS/CF
query will be timeout sometimes because there is no resource for it.
3. The maximum length of the mail subject is 2037 right now. The mail subject you
input is 2037, but you need to add the length of (A)"subject: " and (B)"\r\n", (A)+(B)
is 11 bytes. They equal to 2048.
[Bandwidth Management]
1. Bandwidth management H.323 service does not support Netmeeting H.323
application.
2. If H323/SIP ALG doesn’t work, the Bandwidth management cannot manage the
traffic too.
[Bridge Mode]
1. In the following topology, Firewall VPN to LAN ping can’t be permitted.
PC1--------------DUT1--------NAT Router------PQA lab-----DUT2------PC2
IP: 192.168.1.33 IP: 192.168.1.2 LAN: 192.168.1.1 WAN: 172.25.21.24 IP: 192.168.2.33
GW: 192.168.1.2 WAN: 172.25.21.200 LAN: 192.168.2.1 GW: 192.168.2.1
(1) DUT1 is on bridge mode, DUT2 is on router mode, build VPN tunnel between
them.
(2) On DUT1 enable Firewall, and set Drop for VPN to LAN, then add a firewall
rule of VPN to LAN:
Source address = 192.168.2.33
Destination Address = 192.168.1.33
Selected Service = Any (ICMP)
Komentáře k této Příručce