Security appliances software versions MX 26.1.2 changelog Executive summary This is a new beta release for MX 26.1. It contains new feature functionality that expands connectivity options and security capabilities. For customers already running MX 26.1, this release contains a range of fixes across dynamic routing and VPN. It also improves device stability and the consistency of network performance. Please read through the full details below. What's new Added support for configuring Virtual Router Forwarding domains (VRF) through the Early Access feature program. Added support for configuring up to 4 WAN interfaces on C8455-G2-MX appliances. Added expanded VPN NAT solutions. There is now support for configuring IPv4 subnet translation, VPN host translation rules, and VPN port forwarding rules. Added support for non-NATed WAN uplinks (Routed interfaces) and the ability to manually configure the L3 inbound firewall rules. Expanded support for Adaptive Policy, including Secure Group Tag (SGT) assignment based on Group Policy, SGT to group policy mapping, and SGT transport with MDATA. Bug fixes - general fixes Fixed multiple issues that could result in an unexpected device reboot. (MX-44148) (MX-44723) (MX-39828) Resolved an issue that could result in eBGP connections failing to form over PPPoE uplinks. (Tracking ID available soon) Resolved an issue that could cause eBGP packets being routed incorrectly when 1) the MX appliance was configured in passthrough VPN concentrator mode, 2) eBGP multihop was configured, and 3) another AutoVPN peer advertised a VPN route that overlapped with the eBGP peer’s IP address. (MX-44272) Fixed an issue that resulted in MX appliances configured in routed mode incorrectly sending management traffic to their default gateway, as opposed to a default route learned via eBGP. (MX-43274) Corrected a case that resulted in MX appliances operating as VPN concentrators failing to advertise a connected AutoVPN spoke’s routes via OSPF. (MX-42189) Resolved a rare issue that could result in AutoVPN traffic being dropped. (MX-43737) Corrected a rare issue that could result in disruption to AnyConnect client VPN connectivity if Mobile Device Management (MDM) had ever been enabled in the organization. (MX-44403) Fixed an issue that resulted in route status information for IPsec VPN peers to be displayed as “-” in the Meraki Dashboard. (MX-43028) Resolved a regression that could result in traffic being incorrectly dropped when 1) a port forward, 1:1 NAT, or 1:M NAT was configured, 2) a static default route (0.0.0.0/0) was also configured, and 3) a LAN client was responding to a WAN-initiated connection. (MX-43847) Corrected an MX 26.1 problem that resulted in content filtering not automatically initializing after being enabled. This could have been worked around by rebooting the appliance. (Tracking ID available soon) Fixed a very rare issue that could result in elevated device workload when processing HTTP traffic with out of order packets. (MX-44666) Fixed a rare issue that could result in firewall rule configurations being unnecessarily reloaded. This may have introduced momentary reductions in network performance, especially when complex firewall rule sets were in use. (MX-45846) Resolved an issue that could result in unexpectedly high memory usage when Meraki Insight was enabled. (MX-43469) Bug fixes - limited platform fixes Corrected an issue that could result in IPsec VPN tunnels failing to establish on MX95, MX105, MX250, MX450, and C8455-G2-MX appliances. (MX-44724) Fixed an issue that could result in IPsec VPN traffic failing on C8455-G2-MX appliances. (MX-45847) Resolved an issue that could result in network routing problem when 1) C8455-G2-MX appliances were configured for warm spare (HA) and 2) an administrator swapped the primary and spare roles of the two appliances. (MX-44412) Corrected an issue that resulted in MX85 appliances erroneously dropping CDP and LLDP frames. (MX-44332) Legacy products notice When configured for this version, Z3(C) devices will run MX 19.2.7. When configured for this version, MX64(W), MX65(W), MX84, MX100, and vMX100 devices will run MX 18.107.13. Known issues Due to an MX 26.1 regression, Z4C appliances may fail to establish IPv6 connectivity over a cellular connection. (Tracking ID available soon) Other C8455-G2-MX appliances will no longer automatically drop all packets with an invalid layer 4 checksum value. This aligns behavior with other MX and Z appliances. This traffic may still be dropped by other product features like AMP or Intrusion Prevention. MX250, MX450, and C8455-G2-MX appliances will now default to 50% of their typical maximum concurrent flow capacity when Intrusion Detection or Intrusion Prevention is enabled. The product complies with EN 18031-1:2024 and EN 18031-2: 2024
... View more