ArticlesArticles Most Popular ArticlesMost Popular Articles Most Helpful ArticlesMost Helpful Articles
RSS Feeds
DrillDown Icon Table of Contents Back
 . . . . . . . . . . . . .
DrillDown Icon Home
DrillDown Icon Cyberoam Security Appliances (UTM and NGFW)
DrillDown Icon Common Criteria (EAL4+) Compliant CyberoamOS
DrillDown Icon Version 10.X
DrillDown Icon Version 9.x
DrillDown Icon Release Notes
DrillDown Icon V 9.6
DrillDown Icon V 9.5.8 build 68 - For CR15i only
DrillDown Icon V 9.5.8 build 60 - For CR15i only
DrillDown Icon V 9.5.8
DrillDown Icon Release Notes
DrillDown Icon Known Issues
DrillDown Icon V 9.5.4
DrillDown Icon V 9.5.3 build 22
DrillDown Icon V 9.5.3 build 18
DrillDown Icon V 9.5.3 build 14
DrillDown Icon Archives
DrillDown Icon Guides
DrillDown Icon Getting Started Guide
DrillDown Icon IPS Release Notes
DrillDown Icon Application Filter Release Notes
DrillDown Icon Cyberoam Migration Assistant Guide
DrillDown Icon Cyberoam Virtual Appliances
DrillDown Icon Cyberoam Central Console
DrillDown Icon Cyberoam's On-Cloud Management Service
DrillDown Icon Cyberoam iView – Logging & Reporting
DrillDown Icon Clients
  Email This ArticlePrint PreviewPrint Current Article and All Sub-Articles
Rate Icon Rate Icon Rate Icon Rate Icon Rate Icon
 
known Issues

The purpose of this list is to give an overview of known issues. The ID denotes the internal Cyberoam bug tracking ID and will be shown in the Bug Fixes if the issue is fixed.  

Anti Spam

Bug ID – 3618
Description – Spam filtering based on RBL (Realtime Blackhole List) does not work.
 
Bug ID – 3620
Description – More than 10 email addresses cannot be grouped in an Email Address group. If required, addresses are to be specified one by one. Also, email address group field size is restricted to 255 characters.
 
Bug ID - 4511           
Description – Change in Administrator Email id for Anti virus and Antispam notifications from Web Admin console is not reflected on CLI Console.
 
Bug ID - 4627           
Description –When Outlook 2007 is configured as a Mail Client to retrieve mails through IMAP protocol, IMAP prefix subject does not work.
 
Bug ID - 5194
Description – Anti Spam “From Email Address” Advanced rule does not work as expected.
 
Bug ID – 5475
Description – On General Configuration page of Antivirus and Antispam:

Incorrect file size is mentioned in the SMTP File scanning Tip. Tip reads as “(Enter 0 for default size restriction of 50MB)” but should read as “(Enter 0 for default size restriction of 48.8MB)”.

Incorrect file size range is mentioned in the Error message when one tries to configure value which is not within the acceptable range. Message reads as "Enter size between 0 to 50000(KB)” but should read as "Enter size between 0 to 51200(KB)”
 

Anti Virus

Bug ID – 2223
Description – Virus infected files downloaded using any of the web mail clients are not detected and blocked. Most of the web mail clients like yahoo, hotmail have their own scanning process. Cyberoam may not detect virus if scanning is disabled or bypassed by mail client.
 
Bug ID - 4157           
Description - Even when Anti virus scanning is disabled in the Firewall rule, HTTP Live session statistics display AV scan time as 1 second.
 
 
Bug ID – 5513
Description – When virus scanning and Internet Access policy is applied, one cannot access URLs e.g. http://webcam.www.gov.tw/index.htm which requires connecting to port 20480 through Internet Explorer browser but the same sites accessible through Mozilla Firefox.

Bug ID - 5816
Description - when link speed is low and virus scanning is enabled, it is not possible to send mails with large attachments.
 
Bug ID – 5704
Description – When Cyberoam detects and strips the protected attachment from the mail, Administrator and Mail Receiver is sent a Notification mail with incorrect reason. Notification mail reads as “Infected attachment removed” but should read as “Attachment removed”. Even the name of the file which was stripped is not included in the mail. 

Administrator receives only the Notification mail without the original message even if “Send Original” action is configured in the Virus Scan policy.

Bug ID – 5616
Description – When a firewall rule for virtual host is created for HTTP access and virus scanning is enabled, Cyberoam allows to upload the virus infected file i.e. does not detect and block the virus infected file 
 

Backup and Restore

Bug ID – 6222
Description – After restoring backup, virtual host does not work. This situation occurs only when cross model backup is restored e.g. CR500i back is restored on CR100i or CR100i 

Bug ID – 6291
Description – When cross model backup is restored, Source zone and host are not restored and remain blank
 
Bug ID – 6339
Description – CLI password is not restored but changed to the default password after restoring backup of V 9.5.4 build 86 on V 9.5.8.

Bug ID – 6446

Description – With cross-model backup restore, HTTP Proxy configuration is not restored after restoring backup of V 9.5.4 build 86 on V 9.5.8.
 
Bug ID – 6447
Description – With cross-model backup restore, after restoring backup of V 9.5.4 build 86 on V 9.5.8, one has to manually save the Logs configuration to re-start logging events on Syslog server.

Bug ID - 6461
Description - After restoring backup, bypass stateful firewall configuration (from CLI) is not restored if configured

 

Bandwidth policy

Bug ID – 4746
Description – Cyberoam does not allocate bandwidth as per the configured User based Bandwidth policy. 

Categorization

Bug ID – 531
Description – All the URIs which include “.au” are incorrectly blocked under Audio File Type category.

Bug ID – 2336
Description – Allowing Application categories or file type categories in “Deny All” Internet Access policy does not work.
 
Bug ID – 2372
Description – Cyberoam does not support MSN voice chat.
 
Bug ID – 2382
Description – Access denied message displays incorrect category name when access to File Type category is not allowed.
 
Bug ID – 3947
Description – Blocking “Remote Desktop Protocol” Application protocol category blocks Google Talk also. 
 
Bug ID – 3357
Description – After removing URL from the custom category, Cyberoam does not include the removed URL in any of its default categories. For example, by default, “google.com” is categorized in “SearchEngine” default category but a custom category “webmail’ is created for “google.com”. After removing “google.com” from “webmail” category, it is not included in default category.
 
Bug ID – 4389
Description – “Allow” Type Internet Access policy does not block Yahoo file transfers.
 
 
Bug ID - 6172
Description – It is not possible to include white space in the custom web category name. Message reads as “Only numeric character are allowed for Web Category name” but should read as “Only alphanumeric characters are allowed in Web Category name”.

Clientless User

Bug ID – 89
Description – When not a single Logon Pool based Bandwidth policy is configured, it is not possible to create Clientless user. In other words, one needs to configure at-least one log on pool based bandwidth policy to add clientless user and group.
 
Bug ID – 422
Description – It is possible to include special characters like single quote, double and square brackets in clientless user name whereas only alpha numeric character, ‘_’ and ‘.’ are allowed.

Bug ID – 432

Description – Whenever “Add User” button is clicked followed by clicking “Create User(s)” button, incorrect message is displayed. Message read as “Only alpha numeric character, ‘_’ and ‘.’ are allowed in username”. Message should read as “You must enter user name”
 
Bug ID – 433
Description – Confirmation message is not displayed when clientless user is created or active Clientless user is deleted or deactivated.  
 
Bug ID – 474
Description – It is not possible to search Clientless user with IP address 
 
Command Line Interface (CLI)

Bug ID - 203
Description - Command "show running-config" executed from Option 3 Route Configuration, Option 1 Configure Unicast Routing, Option 1 Configure Static-routes/ACLs does not display the default System routes.
 
Bug ID – 792
Description – CLI Console “Admin” user password can be reset to any length from Web Admin Console but at the time of login, CLI console supports only 9 characters. Due to this, it is possible to login with the password with wrong characters after first 9 characters in a password string

Bug ID - 5103
Description – Executing check_disk and repair_disk CLI commands gives error in the CR500i, CR 1000i and CR1500i appliances. 
 
Bug ID - 5786
Description – Cyberoam hangs after executing “cyberoam restart all” command. Improper Confirmation message is displayed at the time of executing the command. Message reads as “Restart Cyberoam  (y/n):  No (Enter) >       enter 'y'  or press only enter key”  but it should read as “Restart Cyberoam  (y/n):  No (Enter) >          Type ‘y’ for Yes or press <Enter> key for No”
 
Bug ID – 6008
Description – When one tries to upgrade WebCat Database from CLI console, incorrect message is appears. Message reads as "-54% Download Completed” but it should read as "54% Download Completed”
 

Command Line Interface (CLI) over Web Admin Console

 
Bug ID – 1067
Description – If the link speed is slow, sometimes the typed characters are displayed in incorrect sequence. 

Bug ID – 5924

Description – Incorrect behavior of System Date menu. Instead of asking to configure date after configuring time zone, it is asking after the Set System Date menu is closed. Correct behavior or flow for the System Date menu should be: Set TimeZone, Set Date, Exit from menu 

Bug ID - 6002
Description – Incorrect behavior of System Date menu. If “y” is typed before configuring time zone, one can configure date before configuring time zone. 
Instead of displaying “Cyberoam corporate version 9.5.4 build 86" in new line, it is displayed
 
Bug ID - 6005
Description – When one tries to change the date by accessing CLI through Web Admin Console, Cyberoam accepts the invalid value for month and day and does not give any error message.     

Dashboard

Bug ID – 950
Description – Dashboard data is not flushed when backup is restored on another Appliance. 

Data transfer policy

Bug ID – 5636
Description – When cyclic data transfer limit is configured, once the limit is attained the limit counter is reset to zero if user does not log out i.e. user can transfer data beyond the limit if does not logout.

Firewall

Bug ID – 1170
Description – Firewall rule does not display the file upload statistics i.e. number of bytes uploaded.
 
Bug ID – 1179
Description – It is possible to create an “IP” Protocol based service under “Other” protocol with any protocol number.
 
Bug ID – 2417
Description – Create and Edit Firewall Rule page does not displays correct IP address of PPPoE interface.
 
Bug ID – 4281
Description – There is mismatch in the bandwidth usage displayed on Manage Firewall page and Live user page of Web Admin Console.
 
Bug ID – 4346
Description – When “Drop” firewall rule is configured for DMZ or WAN zone, instead of HTTP login page, blank page is displayed.
 
Bug ID – 5403
Description – Host name cannot include special characters space or underscore but when one tries to include them incorrect error message appears. The message reads “Enter valid Host name. Only alphanumeric characters, space, dot and ‘_’ allowed“ but should read as “Enter valid Host name. Only alphanumeric characters and dot allowed.”
 
Bug ID – 5438
Description – After adding a new rule for DMZ to WAN zone, the Internet connectivity for DMZ zone is lost. To re-establish connectivity, one has to rebuild firewall state from CLI.
 
Bug ID – 5554
Description – When multiple gateways (for load balancing) are defined on Cyberoam i.e. SNAT policy and Internet access policy is applied, users are not able to access the Internet consistently. This is because instead of using the same gateway for routing inbound and outbound traffic, Cyberoam routes outbound and inbound traffic through different gateways. 
 
Bug ID – 5645
Description – WAN to LOCAL firewall rules are not applied and because of this entire traffic follows WAN to LAN rule.
 
Bug ID – 5812
Description – When Strict policy is applied through Wizard, users are able to access the Internet but ICMP protocol is blocked as a result not able to ping any WAN IP addressed
 
Bug ID – 5868
Description – When the ports of multiple WAN links are swapped from Network Configuration Wizard, the WAN IP addresses in source based routing rules does not change automatically. One has to manually change the IPs in all the source based routing rules.
 
Bug ID – 5925
Description – Advanced Firewall custom setting configured from CLI console are not retained after restoring backup from version 9.5.3 build 22 and version 9.5.4 build 66 to version 9.5.4 build 86
 
Bug ID – 5928
Description – After restoring backup from version 9.5.3 build 22 to version 9.5.4 build 84, LAN to WAN firewall rules are not applied. 

Bug ID – 6150
Description – When FTP scanning is enabled, Cyberoam drops all those connection requests whose FTP server response packet length exceeds 255 characters.
  

Group

Bug ID - 397
Description - Group name cannot include special characters like ‘-‘ or ‘& but when one tries to include them incorrect error message appears. The message reads “Enter valid Group Name. Only alphanumeric characters, space and ‘_’ allowed“ but should read as “Enter valid Group Name. Only alphanumeric characters and dot allowed.
 
Bug ID – 972
Description – Normal users can be as the member of Clientless group but as per the default behavior, clientless group cannot have normal users as a group member.
 
Bug ID – 1042
Description – After changing the user group membership, users still inherit the old group’s data transfer policy. This situation occurs only when “Unlimited” data transfer policy is attached to the new group.
 
Bug ID – 6226
Description - Error “IPs are already in use” is received when one tries to create multiple clientless users for the IP address range added to the existing logon pool. Hence, one has to create single clientless user for the individual IP address for the required range. For example, if additional 50 addresses are added in the IP range, one has to create clientless user for each IP address one by one. 

Again, if the network is not in the Auth Network, users will be activated but will not be able to logon. Due to this, users will not be displayed in the Manage Live User or Manage Clientless User page but search result will display the list of newly added clientless users. 

One needs to restart management services from CLI console after adding network in Auth Networks.   

High Availability

Bug ID – 103
Description – Cluster appliances transits to an incorrect state if either of the appliances gets rebooted at the time of state transition

Bug ID – 648
Description – When OSPF routing is configured, connectivity delay is observed after restarting primary appliance.
 
Bug ID – 859
Description – Virtual host does not work when HA cluster is configured.
 
Bug ID – 1100
Description – When Active-Active cluster is configured, there is a possibility that non-http and non-https traffic might get dropped in-spite of allowing the entire traffic
 
Bug ID – 5330
Description – HA synchronization process does not synchronize date and time setting if updated from Network Configuration Wizard.
 
Bug ID – 5361
Description – In Active-Passive HA cluster, removing interface alias from primary appliance does not remove from auxiliary appliance.
 
Bug ID – 4452
Description – In Active-Passive HA cluster, FTP session established from Primary appliance closes after primary appliance is rebooted.
 
Bug ID - 5221
Description – HA synchronization process does not synchronize IDP configuration.
 
Bug ID – 5401
Description – It is possible to reset primary appliance to factory default configuration from CLI console when Active-Passive cluster is configured.
 
Bug ID – 5444
Description – After disabling HA from either of the Appliances, HA doclet from Dashboard is not removed from the primary appliance.
  

Bug ID – 5696
Description – HA configuration is retained after resetting to factory default.
 
Internet Access Policy (IAP)
Bug ID – 6233
Description – If the Internet Access policy created based on the policy template is not saved, it is possible to apply policy to the user but the access rules are not applied as per the policy.
Intrusion Detection and Prevention (IDP)
Bug ID – 826
Description – One has to configure action as “OFF” twice to disable the individual IPS signature scanning from the IPS policy

Bug ID – 919
Description – Custom IPS signature are retained on resetting to factory default settings.

Bug ID – 2958
Description – IDP policy is not applied immediately after creation. One needs to restart management services (RMS) from Telnet Console.
 
Bug ID – 3335
Description – Update successful confirmation message is displayed even when custom IDP signature name is not updated successfully.
 
Bug ID - 4903
Description – Disabling IDP Signature Category does not disable all the signatures included in the category automatically. One has to manually disable all the signatures.
 
Bug ID – 4692
Description – Skype cannot be blocked using Skype signatures.
 
Bug ID – 5434
Description – After upgrading to version 9.5.4 build 66 from version 9.5.3 build 22, IDP logs are not generated. This happens because, in version 9.5.4 build 66, by default, IDP logging is disabled. One has to enable IDP logging from System>Manage Data> Configure Autopurge Utility page of Web Admin Console.
 
Bug ID – 5487
Description – Certain Internet Banking sites were not accessible due to Ultrasurf IDP signature.
 
Bug ID – 5690
Description – “Recent IPS Alerts” doclet on Dashboard displays alerts with severity as zero instead of Critical, Moderate or Warning for the signature OpenSSL SSL_get_shared_ciphers Function Off-by-one Buffer Overflow

Logs and Reports


Bug ID – 259
Description – “Top 10 Categories – Data transfer wise” report displays same amount of bytes transferred for most of the categories.
 
Bug ID – 402
Description – Recent Mail Viruses detected doclet of Dashboard displays recipient name with special characters. Blank report page is displayed when one clicks the link to view the details.
 
Bug ID – 487
Description – Gateway wise Bandwidth usage graphs are not displayed in Web Admin Console.
 
Work around - Flush the graphs from CLI console (Option 2. System Configuration > Option 7. Bandwidth Graph Setting > Option 3. Flush All Bandwidth Graph) if :
  • graphs are not displayed after upgrading from v 9.5.8 build 38 to 9.5.8 build 52 
  • graphs were not displayed even in the v 9.5.8 build 38 or earlier versions, upgrade to version 9.5.8 build 52 and than flush the graphs.
Bug ID – 954
Description – Inconsistent Bandwidth usage graph title. Displays data transfer as Bytes/Sec instead of Bits/sec for weekly, monthly and yearly reports.
 
Bug ID – 2229
Description – Blocked Attempts report does not provide details of any attempt to blocked ActiveX, Applets, and Cookies Category.
 
Bug ID – 2412
Description – IDP reports does not include action taken on IDP alerts.
 
Bug ID – 2549
Description – Data fields sequence in the tabular format and CSV format is different in Web Surfing reports as well as Traffic Discovery reports.
 
Bug ID – 4128
Description – Data field sequence mismatch in tabular and CSV format of Anti Virus report.
 
Bug ID - 4649
Description – Data field sequence mismatch in tabular and CSV format of Spam report.
 
Bug ID - 4855
Description – Blocked File Types (attachment) reports are included in Anti Spam reports instead of Anti Virus reports.
 
Bug ID – 5247
Description – Even when user is not able to upload or download the entire file due data transfer restriction, entire file size is considered in web surfing report. For example, if user is restricted to upload 8 MB and tries to upload 10 MB file then web surfing report displays 10 MB of data transfer instead of 8 MB.
 
Bug ID – 5427
Description – Traffic Discovery report by Source port incorrectly displays destination port similarly Traffic Discovery report by Destination port incorrectly displays source port.
 
Bug ID – 5476
Description – When by mistake, system date is configured to future date, Bandwidth graph (Web Admin Console) and System health graphs (Diagnostic tool) are not generated up to the configured date and time. Graphs are not generated even after configuring correct date. E.g. If current date is 10/07/2008 and system date is set to 23/12/2009 then graphs will not be generated till 23/12/2009
 
Bug ID – 5508
Description – When non-English version of Google and Yahoo are used for searching, Google and Yahoo Search Keywords reports display multiple entries for each searched Keywords.
 
Bug ID – 5518
Description – Audit log generated from CLI console and Web Admin Console do not match.
 
Bug ID – 5521
Description – “Category wise trends for yesterday” proactive report is mailed without any data.
 
Bug ID – 5530
Description – Data fields sequence mismatch in the tabular format and CSV format of IDP reports.
 
Bug ID – 5556
Description – When Anti Virus and Anti Spam subscription modules are not subscribed, blank page is displayed for Periodic Data report (Report>Anti Virus>Mail Summary).
 
Bug ID – 5562
Description – Upload and Download Data mismatch on Traffic discovery Live Connection and Connection History page.
 
Bug ID – 6156
Description – Hourly Trend reports should display trends for 10 hours but when the report start hour is specified as 12 or higher, report does not display trends for 10 hours.
 
Bug ID – 6221
Description – Drill down reports of Group wise Web Surfing report displays incomplete username if it exceeds 30 characters.  
 
Multiple Gateway
Bug ID – 473
Description – Gateway Status change alert messages where mailed at the HA Admin Email ID only High Availability cluster is configured. Due to this, Cyberoam Administrator does not receive such mails if HA was not configured or Appliances in which HA feature is not supported.

Now, all the gateway status related mails will be mailed at the Cyberoam Administrator Email ID configured from Network Configuration Wizard and not the HA Admin Email ID. HA Admin will receive only the mails related with the HA.

Bug ID – 3621
Description – Even when gateway is defined explicitly in firewall rule, it is not possible to access Internet if multiple gateways are defined and both the Gateways are down.

 
Bug ID – 3653
Description – Even when gateway is defined explicitly in firewall rule, it is not possible to access Internet if multiple gateways are defined and gateway weight configured as zero (0). 
  
 
Bug ID – 5982
Description – Even when load balancing is implemented between multiple gateways, Internet traffic is passing through only one gateway.
 
Bug ID – 6010
Description – When multiple gateways are configured, Gateway status is displayed as “Dead” even when gateway is “Live”. This happens because incorrect Interface information is passed to the Dead Gateway Detection module.
 
Bug ID - 6224
Description - When three gateways are configured - two as "Active" and one as "Backup", traffic is not consistently routed through the backup gateway if both the active gateways go down simultaneously.

Parent Proxy

Bug ID – 361
Description – When parent proxy is configured and scanning is enabled, it is not possible to access internally hosted servers from the Internet. This is because all the requests are forwarded to parent proxy instead of the internally hosted servers.

PPPoE

Bug ID – 3816
Description – When PPPoE is enabled, Cyberoam terminates L2TP connection within 2 minutes.
 
Bug ID – 4320
Description – When PPPoE is configured, VPN daemon starts twice. Once when PPPoE is enabled and second time when IP address is leased.
 
Bug ID - 4863
Description - Multiple PPPoE connections cannot be established from single IP address subnet.
 

Proxy

Bug ID – 459
Description – It is not possible to use Outlook Web Access (OWA) when anti-virus scanning is enabled

Bug ID – 2178
Description – When FTP scanning is enabled on Cyberoam and FTP proxy is not enabled in Firefox Mozilla web browser, virus infected files are not blocked for FTP over HTTP. Browser displayed ‘Failed to change directory’ 550 error.

 
Bug ID – 2334
Description – Yahoo Webcam is not supported when Cyberoam is configured as Proxy server.
 
Bug ID – 4251
Description – When Browser proxy is configured, it is not possible to upload data on FTP server. However it is possible to upload from Command Line Interface.
 
Bug ID - 5245
Description – HTTP Secure (HTTPS) traffic is redirected to HTTP proxy even when Internet Access policy is configured.

Bug ID – 5280
Description – FTP client timeouts while uploading large files.
  

Rollback
Bug ID - 218
Description – After Cyberoam is rollbacked from version 9.5.8.x to version 9.5.4.x, Online help is not rolled backed
System

Bug ID – 316

Description – LAN Bypass rule created from Advanced Firewall rule configuration of CLI console is not removed after resetting to factory default.

Bug ID – 324
Description – CLI console command “show network interfaces” does not display MSS value
 
Bug ID – 455
Description – Cyberoam is not able to learn route when RIP routing is configured in plain mode i.e. when authentication is not enabled.
 
Bug ID – 484
Description – When Gateway is assigned static IP address, Cyberoam ARP table does not updated when MAC address of gateway changes.
 
Bug ID – 582
Description – When using Google Chrome browser it is not possible to configure DHCP server.
 
Bug ID – 656
Description – Sometimes at the time of downloading an email from POP3 server, the connection drops intermittently and due to this the entire downloading process re-starts. Hence user receives each mail twice or thrice.

Similarly, sometimes it is not possible to send mail with an attachment from Gmail. The process takes longer than expected and display “Still Trying” message.  

The exact configuration parameters that trigger this situation are not known. If you face this problem, you are requested to contact at support@cyberoam.com with the deployment details.

Bug ID – 2044
Description – After changing Cyberoam deployment mode from Bridge to Route, if ‘Monitor only’ Internet Access policy is configured through Network Configuration Wizard, SNAT/Masquerade policy is not automatically applied. One has to apply manually.
 
Bug ID – 2106
Description – Anti Virus and Anti Spam reports are not included in backup.
 
Bug ID – 2520
Description – If the zone of the Ethernet port is changed using Network Configuration Wizard, changes are not automatically reflected in DDNS account configuration. One needs to manually change the DDNS configuration.
 
Bug ID – 2521
Description – Change in IP address of Gateway is not automatically reflected in Gateway Failover condition. One needs to manually change the IP address in Failover condition. Till the IP address is changed, status of the Gateway will be displayed as Down.
 
Bug ID – 3763
Description – Dashboard does not display HTTP Traffic Analysis and User Surfing Pattern if Internet Access policy is not applied through Firewall rule.
 
Bug ID – 3799
Description – Cyberoam is not able to resolve to a host name if LAN zone is not configured and hence it takes time open to open Web Admin console.
 
Bug ID – 4208
Description – Cyberoam does not save the modified Notification Email address for Reports (through Network Configuration Wizard). Due to this, mails are send to the previously configured email address only.
 
Bug ID – 4283
Description - Single Sign on users are able to access the Internet even without authentication.
 
Bug ID - 4521
Description – Non-standard ports traffic is also displayed in Port wise traffic discovery report.
 
Bug ID - 4574
Description – Incorrect proxy status is displayed on Web Admin console.
 
Bug ID - 4326
Description - After changing the Cyberoam deployment mode from Bridge to Gateway (Route), NATting is not enabled automatically in the default firewall rules. One has to manually apply MASQ policy in all the default firewall rules.
 
Bug ID - 4994
Description – Backup mode (FTP and Mail) configured in Backup Schedule is not included in backup.
 
Bug ID - 5071
Description – When H323 module is enabled, VoIP connection cannot be established.
 
Bug ID - 5177
Description – When Cyberoam is configured in transparent mode, disable LAN bypass option does not work.
 
Bug ID – 5385
Description – Network Configuration Wizard (Configure Mail Settings) allows to configure SMTP username and password even without enabling SMTP authentication. This behavior is observed with Internet Explorer web browsers only.
 
Bug ID – 5395
Description – Cyberoam becomes inaccessible after changing the deployment mode from transparent to gateway (route), if Virtual LAN is configured.
 
Bug ID – 5401
Description – After upgrading to version 9.5.4 build 66 from version 9.5.4 build 57, Web Admin Console takes time to come up. This behavior is observed when Cyberoam is used to perform DNS queries to resolve IP address.
 
Bug ID – 5414
Description – Applications like Gtalk, Skype using port 443 and not following SSL standard are not accessible.
 
Bug ID – 5416
Description – When Cyberoam is deployed as single NIC proxy, Skype does not work.
 
Bug ID – 5426
Description – After creating a new service, if one rolls back a browser window, browser clears away certain screen components e.g. protocol details, port number fields and also allows to create another service without protocol details or port number which is mandatory information.
 
Bug ID – 5433
Description – Multiple alerts are displayed on the Dashboard for the single event.
 
Bug ID – 5452
Description – when parent proxy is configured in Cyberoam and IDP signature “CYBEROAM External_HTTP_Proxy“ is enabled, users are not able to access the Internet as traffic to parent proxy is dropped.
 
Bug ID – 5453
Description – When Cyberoam is integrated with Active Directory for authentication, users are not able to logon to MyAccount if username is provided with without domain name.
 
Bug ID – 5460
Description – Host name cannot include special characters space or underscore but when one tries to include them incorrect error message appears. The message reads “Enter valid Host name. Only alphanumeric characters, space, dot and ‘_’ allowed. “ but should read as “Enter valid Host name. Only alphanumeric characters and dot allowed.”
 
Bug ID – 5461
Description – High CPU usage makes Cyberoam Web Admin Console inaccessible and users are not able to logon. This behavior is observed when number of HTTP Client users (concurrent) exceed 255.

Workaround - From Web Admin console, disable "Keep Alive Request For HTTP Client" from the relevant group. Users are required to re-login after this configuration change. 

Bug ID – 5479
Description – Recent IDP Alerts doclet of Dashboard displays irrelevant numbers instead of signature name. This happens only for IDP Signature Database version 2.4.14 due to multiple message files for certain signatures.
 
Bug ID – 5480
Description – User Migration Utility imports users from Active Directory without domain name. Due to this, users cannot be authenticated and hence they cannot establish PPTP or L2TP connection.
 
Bug ID – 5516
Description – When ZoneEdit is configured as Dynamic DNS, it does not update its database whenever Cyberoam’s External Interface IP address changes. Manage Dynamic DNS page displays “Could not connect to
www.zoneedit.com
 
Bug ID – 5525
Description – At the time of registering the Cyberoam appliance if the page is refreshed, blank page is opened.
 
Bug ID – 5528
Description – Cyberoam incorrectly allows to create NAT policy when configured in transparent mode.
 
Bug ID – 5529
Description – When firewall rule for virtual host whose external and mapped port are not same then Cyberoam does not detect virus. For example, external port: 8080 and mapped port: 80
 
Bug ID – 5531
Description – All the modules get subscribed automatically when appliance is registered after applying factory default.
 
Bug ID – 5535
Description – Even when Cyberoam’s HTTP and HTTPS access is denied through Local ACL, Cyberoam becomes accessible if it is configured as browser proxy.
 
Bug ID – 5546
Description – Cyberoam does not support POP3 downloader applications used to download mails from external mail server that do not follow RFC standard.
 
Bug ID – 5549
Description – Static routes configured through CLI console are not preserved after restoring backup of version 9.5.0 build 29 or 9.5.3 build 22 on version 9.5.4 build 72.
 
Bug ID – 5550
Description - Advanced firewall setting configured from CLI console are not preserved after restoring backup of version 9.5.0 build 29 or 9.5.3 build 22 on version 9.5.4 build 72.
 
Bug ID – 5551
Description – After restoring backup of version 9.5.0 build 29 on version 9.5.4 build 72, Data Transfer and Cycle Data Transfer values (Customize Client Messages page) are not retained.
 
Bug ID – 5553
Description – After restoring backup of version 9.5.0 build 29 on version 9.5.4 build 72, mail ID in Backup schedule is not preserved.
 
Bug ID – 5560
Description – Group login restriction does not automatically override user login restriction. To implement group login restriction, one has to manually change the restriction for the individual group users. 

Bug ID – 5663

Description – Cyberoam is not able to block access of Anonymous Web proxy. 

Bug ID – 5677

Description – Restoring backup of version 9.5.4 build 66 to version 9.5.4 build 74 does not retain MSS and MTU values. This behavior is observed only when restoring backup on cross model appliance. 

Bug ID – 5560

Description – Factory default retains Mail backup schedule.
 
Bug ID – 5681
Description – Dashboard Alerts messages are not displayed after resetting to factory defaults.
 
Bug ID – 5682
Description – Bandwidth usage graph and System health graph are retained after resetting to factory defaults.
 
Bug ID – 5684
Description – When Cyberoam is configured as DNS server server, Cyberoam is not able to perform DNS lookups to gather IP address information of the FQDNs
 
Bug ID – 5711
Description – HTTP client login window cannot be maximized.
 
Bug ID – 6067
Description – In cross model backup restore, Virtual host configuration is not restored. One will have to manual delete and re-create all the virtual hosts after restoring the backup.
 
Bug ID – 5874
Description – Web Admin Console does not change the status of Gateway immediately after the gateway goes down but changes the status only after approx. 2.5 minutes i.e. status is displayed in red color only after approx. 2.5 minutes.
Traffic Discovery
Bug ID – 5498
Description – When traffic discovery module is enabled, system I/O processes triggers high CPU resource
.
User 
Bug ID – 476
Description – SSO client users do not receive the disconnection message sent from the Live User Page of Web Admin Console

Bug ID – 533
Description – Even when multiple login is restricted, users are able to logon multiple times.  
 
Bug ID – 958
Description – There is mismatch in the total count and number of the live users displayed on the Manage Live User page of Web Admin Console.
  
Bug ID – 1055
Description – SSO client user session is not getting disconnected after the configured session timeout. User login time automatically gets changed every 3 minutes and due to this, session start time (login time) of the live user is changed to the current time.
 
Bug ID - 1144
Description – Cyberoam does not authentication Active Directory users when username includes upper case characters e.g. James.Mathews
 

Virtual host

Bug ID – 5643
Description – When port range is configured, port forward rule for Virtual host does not work after management services are restarted.

Virtual Private Network (VPN)


Bug ID – 456
Description – There is no facility in Cyberoam to stop PPTP server after configuration. Currently to stop PPTP server, one needs to disable the VPN module from Web Admin Console (System Modules Configuration).
 
Bug ID – 492
Description – To establish L2TP connection with “Aggressive” authentication, L2TP client should support “Aggressive authentication mode. Cyberoam does not provide an appropriate message at the time of selecting authentication type as a result when one tries to establish connection, connection is not established.
 
Bug ID – 603
Description - Even when the PPPoE link is down, VPN connection on the link is displayed as “Active”
 
Bug ID – 672
Description – When “*” is configured as remote gateway in Cyberoam and remote host is configured on dynamic IP address, multiple IPSec tunnels cannot be established between remote host and Cyberoam. This happens because Cyberoam does not support mix mode tunnels i.e. one tunnel with Authentication mode as “Main” and another as “Aggressive”.

To establish multiple connections it is required that all the tunnels established on the Cyberoam should be either set as “Main” or “Aggressive” mode.

Bug ID – 673
Description – It is not possible to establish road warrior connection if the road warrior client IP address is on the subnet of any other remote network.
 
Bug ID – 1005
Description – The roadwarrior policy with DES-SHA1 algorithms is exported as 3DES-SHA1 i.e. wrong algorithms.
 
Bug ID – 1036
Description – For NAT over VPN tunnel, when the LAN IP address is the first IP address in the IP address range configured as Local or Remote network in the VPN policy, Cyberoam drops such VPN traffic.
 
Bug ID – 1097
Description – When the VPN client password length is of 16 or more characters, it is not possible to establish PPTP or L2TP tunnel.
 
Bug ID – 3003
Description – Under the testing environment it is found that when multiple gateways are defined on Cyberoam, VPN connection from one WAN Interface does not consistently fail over to the another WAN Interface. The exact configuration parameters that trigger this situation are not known. If you face this problem, you are requested to contact at support@cyberoam.com with the scenario details.
 
Bug ID – 3004 
Description – If the VPN client initiating PPTP connection is behind the NAT box then Cyberoam allows only one PPTP connection.
 
Bug ID - 4466
Description - It was possible to create multiple VPN connections with the same subnet configured for Remote LAN network
.
 
Bug ID - 4599
Description –When Cyberoam is deployed behind a NAT device, L2TP connection cannot be established.
 
Bug ID – 5398
Description – After L2TP connection status is displayed as “Connected” even when disconnected. One has to disconnect manually. This behavior is observed when L2TP connection request is routed through NAT router.
 
Bug ID – 5543
Description – One needs to restart management services to add or remove VPN routes after enabling or disabling VPN module (System Module Configuration).
   

Bug ID – 5565
Description – It is possible to establish only one Road Warrior connection when two or more IPSec Road Warrior connections are created with the same preshared key
 
Bug ID – 5693
Description – Cyberoam incorrectly allows to delete PPTP and L2TP users from Manage Active page. But, deleted users are displayed on PPTP and L2TP Configuration page.
 
Bug ID – 6204
Description - L2TP connection cannot be re-established after it is frequently disconnected from Windows L2TP client
 
Bug ID - 6269
Description - One needs to manually update L2TP configuration after changing the LAN IP address. L2TP configuration page on Web Admin Console does not even provide the warning message for updating the configuration. Similar situation is faced with PPTP configuration.

Web Admin Console

Bug ID – 270
Description – Format mismatch in advanced firewall configuration parameters when CLI console is accessed through Telnet and HTTP Interface. For example, when CLI is accessed over Telnet, parameters are displayed with special character underscore (_) e.g. source_network, while parameters are displayed without underscore e.g. source network, when CLI is accessed over HTTP Interface.
 
Bug ID – 307
Description – Cyberoam does not support UTF-8 Encoding as a result parsing problem occurs.

Bug ID – 681
Description – HTTP Client login template is not accessible from Browser Google Chrome.
 
Bug ID – 693
Description – Gateway wise Bandwidth usage graphs contains break
 
Bug ID – 749
Description – If more than one Firewall log is not configured for syslog server from System > Logging > Logs Configuration page, Cyberoam does not send firewall rules log to the syslog server.
  
Bug ID – 2335
Description – Combo box is not displayed when overlapped with expanded menu if Web Admin Console is accessed using Internet Explorer.
 
Bug ID – 5647
Description – After upgrading from version 9.5.4 build 66 to version 9.5.4 build 74, Web Admin Console becomes inaccessible. Web Admin Console becomes accessible only after restarting management services.

Bug ID – 5593
Description – In Gatewaywise Composite Bandwidth Usage Graph, titles and data values are not aligned. 

Bug ID – 5625
Description – When Cyberoam is deployed in transparent mode, DHCP server cannot be configured. But, after upgrading from version 9.5.3 build 22 to version 9.5.4 build 74, Cyberoam incorrectly displays DHCP server configuration in Web Admin Console.
 
Bug ID – 5688
Description – Even though Pharming protection is enabled DNS lookup is not performed. One has to disable and enable pharming protection again to perform DNS lookup.
 
Bug ID – 5712
Description – Message "Zone Creation is not available in bridge mode" is not displayed in a default font style.
 

 
 

 

Document version – 1.0-23/12/2008

Article ID: 185