16.2 Changelog

From Edge Threat Management Wiki - Arista
Jump to navigationJump to search
The printable version is no longer supported and may have rendering errors. Please update your browser bookmarks and please use the default browser print function instead.

16.2

16.2 brings the ability to use WPA-2 Enterprise for wireless network authentication. With this release, NG Firewall can be set up as a RADIUS Server to authenticate local or Active Directory users when joining the wireless network.

For more information, see the RADIUS Server and RADIUS Proxy documentation.

Bug Fixes & Updates

  • Fix: WireGuard licensing issues on startup
  • Fix: QoS & IPsec issues on Lanner NCA-4210B hardware
  • Fix: Port forwards on 443/80 not working after 16.0.1 upgrade without changing service ports
  • Fix: TLS v1.3 causing website loading issues
  • IPS signatures updated
  • Updates for applications list for Application Control app

Note on upgrades

The RADIUS Server requires UDP ports 1812 and 1813 to be accessible from your access points if you intend to use the WPA2-Enterprise authentication feature added to this release. Access rules are added by default for new installations, but not for upgrades. Refer to the Access Rules section of the RADIUS Server documentation for details.

16.2.1

16.2.1 is a minor release that resolves bugs in the RADIUS Server introduced by version 16.2.0.

Bug Fixes

  • Fixed RADIUS rules not added during upgrade
  • Fixed RADIUS name mapping not working due to incorrect script permissions
  • Fixed login names by RADIUS truncated at 10 characters
  • Fixed Winbind service not starting after enabling RADIUS Proxy
  • Fixed Freeradius server failing to start on upgrades

16.2.2

16.2.2 is a minor release that resolves an upgrade issue introduced in the 16.2.1 release.