Soft Release UTM 9.4 ?!

Hallo,

auf der Partner Roadshow wurde ein Soft Release Termin genannt. Dieser ist natürlich schon verstrichen, wann ist offiziell mit der 9.4 zu rechnen ?

  • Soft-Release rollout will start soon. Stay tuned.

    The update will be automatically spread via up2date servers for those running the Beta version.

    For those still running 9.35, there will be an update available at the FTP server.

    Later on the update will be rolled out in stages.

    /talex

    - 21 is only half of the truth

  • New version currently downloading 9.400-9.

    Some fixes for wifi, hopefully wil fix my AP10. A couple of other fixes, mail.

    Ian,

    home UTM 9.x running in ESXi 6 e3-1275v2

    AP55c and AP10 (courtesy Astaro)

    Three other UTMs, SUM and SFM in hibernation

    XG 15.x MR3 in hibernation

  • Didn't fix the AP10, but has changed it. All lights on, but no IP address. Occasionally the lan light flashes. Might be an unbrick job?

    Update - I was wrong, the AP10 is assigned an IP address, but the MAC on the device is different to the MAC in the DHCP table.

    Ian,

    home UTM 9.x running in ESXi 6 e3-1275v2

    AP55c and AP10 (courtesy Astaro)

    Three other UTMs, SUM and SFM in hibernation

    XG 15.x MR3 in hibernation

  • My AP30 was fixed after flashing the AP30 with the Red & AP Recovery Application back to the original state.

    After connecting back to the network, the AP30 connected the UTM sucessfully and installed new firmware:

    2016:03:17-12:15:40 firewallhost awed[17391]: [MASTER] access point firmware available: AP15C:9400-53d3a7b AP10:9400-b2f252d AP55C:9400-53d3a7b RED15w:1 AP5:1 AP30:9400-b2f252d AP100C:9400-53d3a7b AP100X:9400-53d3a7b AP50:9400-b2f252d AP55:9400-53d3a7b AP15:9400-53d3a7b AP100:9400-53d3a7b
    2016:03:17-12:32:15 firewallhost awed[4889]: [MASTER] new connection from 10.178.9.x:51941<30>Mar 17 12:32:15 awed[12793]: [A4000C99D******] AP30 from 10.178.9.x:51941 identified as A4000C99D******
    2016:03:17-12:32:15 firewallhost awed[12793]: [A4000C99D******] (Re-)loaded identity and/or configuration
    2016:03:17-12:32:18 firewallhost awed[4889]: [MASTER] updating confd object for AP A4000C99D******
    2016:03:17-12:32:19 firewallhost awed[4889]: [MASTER] AP A4000C99D******: Local metadata updated
    2016:03:17-12:32:19 firewallhost awed[12793]: [A4000C99D******] sent firmware /etc/wireless/firmware/AP30.uimage to device, releasing connection.
    2016:03:17-12:34:21 firewallhost awed[4889]: [MASTER] new connection from 10.178.9.x:33009
    2016:03:17-12:34:21 firewallhost awed[13927]: [A4000C99D******] AP30 from 10.178.9.x:33009 identified as A4000C99D******
    2016:03:17-12:34:21 firewallhost awed[13927]: [A4000C99D******] (Re-)loaded identity and/or configuration
    2016:03:14-08:55:06 10.178.9.x logread[984]: Logread connected to 10.178.9.x:415
    2016:03:14-08:55:07 10.178.9.x aweclient: Config in flash changed, reboot.
    2016:03:14-08:55:07 10.178.9.x syslog: - shutdown -
    2016:03:14-08:55:07 10.178.9.x syslog:
    2016:03:14-08:55:07 10.178.9.x download_ca: CA fingerprint overwritten by TA
    2016:03:14-08:55:07 10.178.9.x syslog:
    2016:03:14-08:55:07 10.178.9.x download_ca: No trusted fingerprint found in certificate chain HUB.
    2016:03:17-12:35:12 firewallhost awed[4889]: [MASTER] new connection from 10.178.9.x:38830
    2016:03:17-12:35:12 firewallhost awed[14244]: [A4000C99D******] AP30 from 10.178.9.x:38830 identified as A4000C99D******
    2016:03:17-12:35:12 firewallhost awed[14244]: [A4000C99D******] (Re-)loaded identity and/or configuration
    2016:03:14-08:55:06 10.178.9.x logread[899]: Logread connected to 172.25.0.254:415
    2016:03:17-12:35:15 firewallhost awed[13927]: [A4000C99D******] ll_read: dead socket: Interrupted system call
    2016:03:17-12:35:15 firewallhost awed[13927]: [A4000C99D******] disconnected. Close socket and kill process.