[Release Note] Nebula Security Gateway Series - Patch 4 firmware has been released!

Options
Nebula Moderator
Nebula Moderator Posts: 127  Zyxel Employee
First Anniversary Friend Collector First Comment

Zyxel Nebula Security Gateway Series 

Release Note

September, 2020


Firmware Version on all models

Zyxel NSG50 - V1.33(ABHP.4)

Zyxel NSG100 - V1.33(ABEA.4)

Zyxel NSG200 - V1.33(ABLD.4)

Zyxel NSG300 - V1.33(ABOS.4)


ENCHANCEMENT

Adopt new Technology from Security Partner: McAfee for Content Filter.

 

BUG FIX

1.     [BUGFIX] ITS#200801574

Symptom:

"SecuExtender IPSec VPN" client application get the configure from server incorrect.

 

2.     [BUGFIX] ITS#200500017

       Symptom:

           Anti-virus cannot block and destroy eicar test file.

       Condition:

            1.     Enable Anti-virus from NCC GUI.

            2.     lan1 client get eicar test file from "malware.wicar.org/data/eicar.com" .

            3.     Anti-virus cannot block and destroy this file.

 

3.     [BUGFIX] ITS#200801085

        Symptom:

            NSG always show CPU high.

        Condition:

              1.     Device power on for a long time.

              2.     show cpu usage keep 99%~100%.

 

4.     [BUGFIX] ITS#200603337

     Symptom:

          L2TP over IPSec authentication fail with Nebula Cloud Authentication.

     Condition:

          1.     L2TP VPN connect to device with cloud auth. account.

          2.     Auth. fail(Incorrect Username and Password).

 

5.     [BUGFIX] ITS#200800815

     Symptom:

         NSG often reconnect to NCC.

      Condition:

          Internet unstable and cause NSG disconnect and reconnect with NCC several times, this symptom persist   even the Internet is back to stable.

 

6.     [BUGFIX] ITS#200603288

      Symptom:

          Throughput no better when disable idp.

     Condition:

          1.     Create a NAT rule.

          2.     Enable idp prevention and detection.

          3.     Test the NAT rule throughput.

          4.     Disable idp prevention and detection.

          5.     Test the NAT rule throughput.

          6.     Step3 and step5 throughput no change.

 

7.     [BUGFIX] ITS#200603347

       Symptom:

           No application statistics info when client ip in outbound rules.

      Condition:

           1.     Create a firewall rule, source ip is LAN1 client ip and set action allow in NCC GUI.

           2.     LAN1 client create ftp traffic.

           3.     Security gateway-> Monitor -> Summary report, no ftp application usage in NCC GUI.

 

8.     [BUGFIX] ITS#200200874

       Symptom:

           Block RDP Brute Force Login fail.

       Condition:

             1.     Create a virtual server rule for RDP(port 3389) of lan1 client.

             2.     Use hydra command to attack step1 wan mapping ip.

                    “time hydra rdp://[step1_wan_ip]:3389 -l administrator -P password.txt -v –I”

             3.     Attack not block.

 

9.     [BUGFIX] ITS#200500330

         Symptom:

              L2TP over IPSec VPN connections hostname didn’t show Russian character.

         Condition:

               1.     PC hostname use Russian character, and use L2TP over IPSec client connect to device.

               2.     VPN connections not display any connection

 

10. [BUGFIX] ITS#200511663, 200517794

        Symptom:

            WAN PPPoE with vlan didn’t work.

       Condition:

           1.     Device local GUI configuration wan PPPoE with vlan id.

           2.     Wan PPPoE doesn't connect.

 

11. [BUGFIX] ITS#200400549

         Symptom:

            NSG300 CPU high

        Condition:

            1.     Keep over 20 VPN tunnels connection.

            2.     CPU usage is high in NCC GUI.

 

12. [BUGFIX] ITS#200300990

         Symptom:

             Port usage counting incorrect.

         Condition:

               1.     Only one client create traffic for a long time.

               2.     Port usage not match client usage.

 

 

13. [BUGFIX] ITS#200300954

          Symptom:

               NSG300 L2TP cloud auth. user cannot login by email.

         Condition:

               1.     Add a "VPN User" user in Cloud auth. page.

               2.     Type in Email length over 31 character.

               3.     Select Login by "Email" and save.

               4.     Enable "L2TP over IPSec client" and Authentication choice Cloud auth. from NCC GUI.

               5.     Client PC use L2TP over IPSec to login to device by "Email".



Nebula Forum Moderator