Hi Everyone,
we want to inform you that we got a couple of customer reports about problems after GA of 9.1 and were our developement team is currently investigating the root cause.
Basically, the following issues could already be identified:
25736: RED firmwareupdate fails if upload takes longer than 3 minutes
>> Problem fixed and staged for version 9.101. Please contact support for a patch if required urgently.
>> Will be included in 9.101
25787: SSL VPN autopacketfilter rules are not set for backend group objects
>> Problem fixed and staged for version 9.101. Please contact support for a patch if required urgently
>> Will be included in 9.101
25742: ha: disabling virtual_mac for ha did not result in different mac addresses on master/slave
>> Under investigation
25868: performance regression in ins_accounting(): Postgres running on 100%
>> Will be included in 9.101
25868: Problem with compression feature in SSL VPN using non 9.100 clients
>> Please reload the SSL VPN client configuration from the user portal
>> Will be included in 9.102
25748: Sending overlay-fw on every Takeover/Restart of the UTM takes too long until all REDs are online again
>> Please wait about 10 minutes after a reboot/restart
>> Will be included in 9.101
25804: New APs not accepted by the UTM
>> Please contact support including Mac address and serial number of the device
25881: Some mailservers fail to establish smtp tls 1.2 connections
>> Planned for version 9.102
25730 Wifi [AP50] mesh: space in mesh_id leads to a reboot loop
>> Please avoid spaces in Mesh IDs
>> Will be included in 9.101
25812 Change Block password guessing to 9.0 default settings
>> Planned for 9.101
25788 Awed died without coredump and logentry due to large Mac address list
>> Under investigation. Please avoid Mac address lists larger than 200 entries
25915 eDir SSO not working, because "user" contains the IP address and not the username
>> Planned for 9.102
25945 WAF Uploads are detected as virus infected when DualScan is active
>> Planned for 9.102
We also corrected a functionality in IPSec VPN that might cause tunnels not to come up. Please have a look at In 9.1 IPSec connections could use bypass policies for a remote network without static routes. for further information.
Last but not least, we have published another knowledge base article about POP3 proxy with SSL encryption here http://www.sophos.com/en-us/support/knowledgebase/119405.aspx
We plan a 9.101 beginning of next week.
Once we have more information, I will update you here.
Cheers
Dominic
This thread was automatically locked due to age.