Netgear FVX538v1 Firmware 1.6.49
I. Overview
This note describes enhancements and bug fixes in the FVX538 Release Version 1.6.49 software.
The enhancements and fixes are those added since Release Version 1.6.29. Published October 18, 2005.
II. New Features
Version 1.6.36
* Trend Micro Antivirus Enforcement
When your LAN is protected by Trend Micro Client/Server/Messaging Suite for SMB, you can configure the firewall to block Web access by LAN PCs that do not have the Trend Micro client installed, or do not have the most recent updates. There is a Trend Micro menu under the Advanced section of the configuration manager.
If you want to use this feature, and a trial verision TrendMicro CD was not included with your router, go to this URL and download the client software: http://www.trendmicro.com/download/trial/trial-us.asp?id=39.
* If you need help with this feature, please contact TrendMicro directly http://kb.trendmicro.com/solutions/search/default.asp.
* XAUTH (Extended Authentication) and RADIUS Support for VPN
XAUTH is configured in IKE Policy menu. RADIUS is configured in the new Radius Client menu.
* NetBIOS Broadcast Support over VPN
Configured in VPN Policy menu.
Version 1.6.29
IKE Mode Config
Mode Config allows a remote VPN client to obtain a virtual IP address and other IP configuration information (DNS, WINS, etc) from the router.
III. Modifications and Bug Fixes
Version 1.6.49
1. Fixed problems with DHCP reserved IP.
2. Fixed route cache entry problem.
3. Custom Service should not be deleted if it is in use in the rules or protocol binding.
4. Increased IKE FQDN to 64 characters.
5. Fixed crash if select PFS group 5 in mode config.
6. Fixed crash if create more than 150 VPN policies.
7. Now allows more than one VPN client to connect using generic authentication.
8. Now allows more than one VPN client to connect using XAUTH/RADIUS with Mode Config.
9. Fixed Block Proxy.
10. Fixed DHCP server is unreachable for PC renew.
11. Can now switch back to Default NTP Server.
12. Time stamp is now present in each log message.
13. Email: authenticate with SMTP server radio button should be on by default.
14. A log message is now generated when Failover occurs.
15. DynDNS password now accepts special characters.
16. Restoring configuration file will now automatically trigger reboot.
17. Miscellaneous bug fixes.
Version 1.6.46
1. User Database - group assignment required for XAUTH. See Known Issues.
2. Classical routing is now allowed on PPPoE connections.
3. Fixed SNMP memory leak.
4. Fixed MTU display problem.
5. Fixed Keyword blocking problem.
6. Fixed additional DynDNS issues - special characters allowed in password.
7. Miscellaneous bug fixes.
Version 1.6.44
1. Host and Groups fixed.
2. SIP ALG issues fixed (particularly for Vonage and AT&T).
Version 1.6.42
1. SIP ALG issues are resolved.
2. Fixed BigPond login for Australia.
3. Fixed PPTP login for Austria.
4. Fixed TrendMicro issue if client AV version later than server version.
5. DHCP Server domain name can now be configured.
6. Fixed NTP issues.
7. Fixed problems with firmware upgrading through WAN HTTPS.
8. Can now edit rules with number larger than 256.
9. Hub and Spoke configuration is now supported.
10. Can now select more than one mode config record from IKE policy.
11. Fixed Telnet, broken in previous version.
12. Miscellaneous bug fixes.
Version 1.6.38
1. Fixed: Can't turn off SMTP Server Authentication in Logs and email menu.
2. Improved Radius menu and help.
Version 1.6.37
1. Added ping option to detect WAN failure.
2. Added VPN failover.
3. Added one-to-one NAT table to show all hosted IP addresses.
4. Improved VPN Status Log for readability.
5. Fixed: Inbound Rules disappear when changing WAN Mode menu.
6. Fixed: Can't access newsgroups (NNTP).
7. Fixed: DynDNS problems.
8. Fixed: PPPoE LCP issue.
9. Fixed: DNSRD IPv6 "AAAA" issue.
10. Fixed: VPN compatibility issue requiring non-zero kbytes value for key lifetime.
11. Fixed: Could not add more than 129 inbound rules.
12. Fixed: Could not upload Microsoft Root certificate.
13. Fixed: Could not check "log all visited web sites".
14. Fixed: MTU value will reset to 1500 after reboot.
15. DHCP Domain Name is now blank instead of netgear.com.
16. Fixed: Edit protocol binding yields an empty page.
17. Fixed: The router status page shows NAT enabled when router is in classical routing.
Version 1.6.29
1. Fixed VPN interoperability issues.
2. Fixed conflicts between mode config and regular client configurations.
3. Updated mode config help screen.
4. Fixed certificate upload problems.
5. PPPoE stability problems are fixed.
6. Can now add custom services up to 125 total services.
7. Increased the total number of possible rules to 600.
8. SMTP login name can now accept up to 50 characters.
Version 1.6.23
1. Fixed: Can't configure inbound policy with classical routing.
2. VPN wizard modified to address FQDN issues.
3. Fixed: FVS338 image can be loaded by mistake.
4. Fixed: GUI can't be accessed over VPN tunnel.
5. Fixed: VPN status drop button not function.
6. Fixed: Disabling VPN policy will not drop tunnel.
7. Fixed: Can't access GUI if "Any" is used for VPN policy Remote IP.
8. Fixed: Can't edit Protocol binding.
9. Fixed: PPPoE default MTU value.
10. Fixed: Enable WAN Ping checkbox for DMZ-WAN rules menu.
11. Erasing to factory defaults now automatically triggers a reboot.
Version 1.6.15
1. IKE policy can now be configured if WAN is down.
2. Periodic crashes fixed.
3. Guest (read-only) default password changed to password.
Version 1.6.12
1. VPN throughput increased.
2. Number of simultaneous sessions increased.
3. Guest (read-only) password can now be changed separately (default is guest).
4. Default gateway is now shown in routing table.
5. Fixed: When WAN2 is primary and in PPPoE mode, VPN tunnel can't pass traffic.
6. Fixed: VPN traffic stops when heavy traffic.
7. Removed One-to-one NAT table and Exposed Host, since these functions can be performed with Inbound Rule.
IV. Known Issues
1. When using XAUTH with the internal User Database (not RADIUS), you must add the VPN client users to the User Database menu to allow client authentications. In the User Database menu, these VPN clients must be assigned to the group with the name of the VPN policy.
2. When using XAUTH with RADIUS, you must use the "Filter-Id" parameter in the RADIUS profile. For the Filter-Id value, enter the name of the VPN policy used by the VPN client.
3. When using XAUTH with ModeConfig, VPN clients must be assigned to DefaultGroup.
4. Due to these User Database menu modifications, we recommend starting from factory defaults. Alternatively please attempt to upgrade this image in the following manner to avoid factory defaults configuration:
1. Delete all VPN Client policies.
2. Reboot the router.
3. Configure VPN Client policies.
5. If enabled, the Trend Micro enforcement will block all web access for several minutes after bootup. Reduce the server refresh rate to 40 seconds to minimize this delay.
6. You may need to toggle Daylight Savings Time setting after upgrade.
7. If you were having problems with reserved IP addresses in Groups and Hosts, you may need to perform a factory default reset after upgrading to the newer version.
8. Can't ping router's LAN IP over VPN unless you enable WAN response to ping.
It is highly recommended to always use the most recent driver version available.
Do not forget to check with our site as often as possible in order to stay updated on the latest drivers, software and games.
Try to set a system restore point before installing a device driver. This will help if you installed a wrong driver. Problems can arise when your hardware device is too old or not supported any longer.
Примечание: Ссылка "скачать" может вести как непосредственно на файл, так и на сайт производителя, на котором Вы можете найти нужный файл.
Это связано с тем, что некоторые производители не позволяют размещать прямые ссылки на файлы.
This note describes enhancements and bug fixes in the FVX538 Release Version 1.6.49 software.
The enhancements and fixes are those added since Release Version 1.6.29. Published October 18, 2005.
II. New Features
Version 1.6.36
* Trend Micro Antivirus Enforcement
When your LAN is protected by Trend Micro Client/Server/Messaging Suite for SMB, you can configure the firewall to block Web access by LAN PCs that do not have the Trend Micro client installed, or do not have the most recent updates. There is a Trend Micro menu under the Advanced section of the configuration manager.
If you want to use this feature, and a trial verision TrendMicro CD was not included with your router, go to this URL and download the client software: http://www.trendmicro.com/download/trial/trial-us.asp?id=39.
* If you need help with this feature, please contact TrendMicro directly http://kb.trendmicro.com/solutions/search/default.asp.
* XAUTH (Extended Authentication) and RADIUS Support for VPN
XAUTH is configured in IKE Policy menu. RADIUS is configured in the new Radius Client menu.
* NetBIOS Broadcast Support over VPN
Configured in VPN Policy menu.
Version 1.6.29
IKE Mode Config
Mode Config allows a remote VPN client to obtain a virtual IP address and other IP configuration information (DNS, WINS, etc) from the router.
III. Modifications and Bug Fixes
Version 1.6.49
1. Fixed problems with DHCP reserved IP.
2. Fixed route cache entry problem.
3. Custom Service should not be deleted if it is in use in the rules or protocol binding.
4. Increased IKE FQDN to 64 characters.
5. Fixed crash if select PFS group 5 in mode config.
6. Fixed crash if create more than 150 VPN policies.
7. Now allows more than one VPN client to connect using generic authentication.
8. Now allows more than one VPN client to connect using XAUTH/RADIUS with Mode Config.
9. Fixed Block Proxy.
10. Fixed DHCP server is unreachable for PC renew.
11. Can now switch back to Default NTP Server.
12. Time stamp is now present in each log message.
13. Email: authenticate with SMTP server radio button should be on by default.
14. A log message is now generated when Failover occurs.
15. DynDNS password now accepts special characters.
16. Restoring configuration file will now automatically trigger reboot.
17. Miscellaneous bug fixes.
Version 1.6.46
1. User Database - group assignment required for XAUTH. See Known Issues.
2. Classical routing is now allowed on PPPoE connections.
3. Fixed SNMP memory leak.
4. Fixed MTU display problem.
5. Fixed Keyword blocking problem.
6. Fixed additional DynDNS issues - special characters allowed in password.
7. Miscellaneous bug fixes.
Version 1.6.44
1. Host and Groups fixed.
2. SIP ALG issues fixed (particularly for Vonage and AT&T).
Version 1.6.42
1. SIP ALG issues are resolved.
2. Fixed BigPond login for Australia.
3. Fixed PPTP login for Austria.
4. Fixed TrendMicro issue if client AV version later than server version.
5. DHCP Server domain name can now be configured.
6. Fixed NTP issues.
7. Fixed problems with firmware upgrading through WAN HTTPS.
8. Can now edit rules with number larger than 256.
9. Hub and Spoke configuration is now supported.
10. Can now select more than one mode config record from IKE policy.
11. Fixed Telnet, broken in previous version.
12. Miscellaneous bug fixes.
Version 1.6.38
1. Fixed: Can't turn off SMTP Server Authentication in Logs and email menu.
2. Improved Radius menu and help.
Version 1.6.37
1. Added ping option to detect WAN failure.
2. Added VPN failover.
3. Added one-to-one NAT table to show all hosted IP addresses.
4. Improved VPN Status Log for readability.
5. Fixed: Inbound Rules disappear when changing WAN Mode menu.
6. Fixed: Can't access newsgroups (NNTP).
7. Fixed: DynDNS problems.
8. Fixed: PPPoE LCP issue.
9. Fixed: DNSRD IPv6 "AAAA" issue.
10. Fixed: VPN compatibility issue requiring non-zero kbytes value for key lifetime.
11. Fixed: Could not add more than 129 inbound rules.
12. Fixed: Could not upload Microsoft Root certificate.
13. Fixed: Could not check "log all visited web sites".
14. Fixed: MTU value will reset to 1500 after reboot.
15. DHCP Domain Name is now blank instead of netgear.com.
16. Fixed: Edit protocol binding yields an empty page.
17. Fixed: The router status page shows NAT enabled when router is in classical routing.
Version 1.6.29
1. Fixed VPN interoperability issues.
2. Fixed conflicts between mode config and regular client configurations.
3. Updated mode config help screen.
4. Fixed certificate upload problems.
5. PPPoE stability problems are fixed.
6. Can now add custom services up to 125 total services.
7. Increased the total number of possible rules to 600.
8. SMTP login name can now accept up to 50 characters.
Version 1.6.23
1. Fixed: Can't configure inbound policy with classical routing.
2. VPN wizard modified to address FQDN issues.
3. Fixed: FVS338 image can be loaded by mistake.
4. Fixed: GUI can't be accessed over VPN tunnel.
5. Fixed: VPN status drop button not function.
6. Fixed: Disabling VPN policy will not drop tunnel.
7. Fixed: Can't access GUI if "Any" is used for VPN policy Remote IP.
8. Fixed: Can't edit Protocol binding.
9. Fixed: PPPoE default MTU value.
10. Fixed: Enable WAN Ping checkbox for DMZ-WAN rules menu.
11. Erasing to factory defaults now automatically triggers a reboot.
Version 1.6.15
1. IKE policy can now be configured if WAN is down.
2. Periodic crashes fixed.
3. Guest (read-only) default password changed to password.
Version 1.6.12
1. VPN throughput increased.
2. Number of simultaneous sessions increased.
3. Guest (read-only) password can now be changed separately (default is guest).
4. Default gateway is now shown in routing table.
5. Fixed: When WAN2 is primary and in PPPoE mode, VPN tunnel can't pass traffic.
6. Fixed: VPN traffic stops when heavy traffic.
7. Removed One-to-one NAT table and Exposed Host, since these functions can be performed with Inbound Rule.
IV. Known Issues
1. When using XAUTH with the internal User Database (not RADIUS), you must add the VPN client users to the User Database menu to allow client authentications. In the User Database menu, these VPN clients must be assigned to the group with the name of the VPN policy.
2. When using XAUTH with RADIUS, you must use the "Filter-Id" parameter in the RADIUS profile. For the Filter-Id value, enter the name of the VPN policy used by the VPN client.
3. When using XAUTH with ModeConfig, VPN clients must be assigned to DefaultGroup.
4. Due to these User Database menu modifications, we recommend starting from factory defaults. Alternatively please attempt to upgrade this image in the following manner to avoid factory defaults configuration:
1. Delete all VPN Client policies.
2. Reboot the router.
3. Configure VPN Client policies.
5. If enabled, the Trend Micro enforcement will block all web access for several minutes after bootup. Reduce the server refresh rate to 40 seconds to minimize this delay.
6. You may need to toggle Daylight Savings Time setting after upgrade.
7. If you were having problems with reserved IP addresses in Groups and Hosts, you may need to perform a factory default reset after upgrading to the newer version.
8. Can't ping router's LAN IP over VPN unless you enable WAN response to ping.
It is highly recommended to always use the most recent driver version available.
Do not forget to check with our site as often as possible in order to stay updated on the latest drivers, software and games.
Try to set a system restore point before installing a device driver. This will help if you installed a wrong driver. Problems can arise when your hardware device is too old or not supported any longer.
Примечание: Ссылка "скачать" может вести как непосредственно на файл, так и на сайт производителя, на котором Вы можете найти нужный файл.
Это связано с тем, что некоторые производители не позволяют размещать прямые ссылки на файлы.