Security appliance firmware versions MX 18.106.1 changelog
Important notice
- This version is the same as MX 18.1.06 for all MXs other than the MX64(W) and MX65(W) family of appliances.
Bug fixes
- Stability improvements for MX64(W) and MX65(W) appliances.
Legacy products notice
- When configured for this version, Z1 and MX80 devices will run MX 14.56.
- When configured for this version, MX400 and MX600 devices will run MX 16.16.9.
Known issues
- After making some configuration changes on MX84 appliances, a brief period of packet loss may occur. This will affect all MX84 appliances on all MX firmware versions
- Due to an MX 15 regression, the management port on MX84 appliances does not provide access to the local status page
- When SGT is enabled on MX84 appliances, any packet larger than 1440 bytes will be dropped. Due to this, we recommend that the SGT feature only be enabled in lab or other non-production environments on MX84 appliances.
- MX appliances will now properly validate that DBD packets conform to the appropriate MTU size. If the MX’s OSPF peer has an improper MTU configured, it may cause the OSPF adjacency to fail to properly form. The updated behavior properly conforms to RFC. Please ensure these settings are properly configured on any MX’s OSPF peers to avoid disruption after upgrading to MX 18.1.X.
- Wireless clients may experience degraded performance for HTTP and HTTPS traffic when content filtering is enabled.
- Due to an MX 17 regression, RADIUS messages that transit across AutoVPN may fail to be routed correctly.
- There may be an increased risk of encountering device stability and performance issues.
If my answer solves your problem please click Accept as Solution so others can benefit from it.