throbber
Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 1 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 1 of 18
`
`
`
`EXHIBIT 9
`
`EXHIBIT 9
`
`
`
`
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 2 of 18
`
`ML Security
`
`Dell“ SonicWALL‘“ SonicOS 6.2.6.0
`
`Release Notes
`
`August 201 6
`
`These release notes provide information about the Dell“ SonicWifiiLLTII SonicOS 6.2.6.0 release.
`
`Topics:
`In About SonicOS 6.2.6.0
`
`a Supported platforms
`0 New features
`
`I Resolved issues
`
`0 Known issues
`
`a Product licensing
`
`a Upgrading information
`
`I Technical support resources
`I About Dell
`
`About SonicOS 6.2.6.0
`
`- Content Filtering Service 4.0
`See the New features section for more information.
`
`This release provides all the features and contains all the resolved issues that Were included in previous
`releases of SonicOS 6.2. For more information, see the previous release notes, available on MySonicWALL or on
`the Support Portal at: https:Hsu pport.software.de{l.comfrelease-notes'product-select.
`
`TZ Series / SOHO Wireless feature support
`Dell SonicWALL SOHO Wireless and TI series appliances running SonicOS 6.2.6.0 support most of the features
`available for other platforms. Only the following features are not supported on the T2 series or SOHO Wireless
`appliances:
`
`- Activemctive Clustering
`
`In Advanced Switching
`
`-_
`I
`Jumbo Frames
`
`0 Link Aggregation
`
`SonicOS 6.2.6.0
`Release Notes
`
`SonioWall-Finjan_00016706
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 3 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 3 of 18
`
`I Port Redundancy
`I Wire Mode
`
`Supported platforms
`
`SonicOS 6.2.6.0 is supported on the following Dell SonicWALL network security appliances:
`
`o SuperMassive 9400
`
`I SuperMassive 9200
`
`I NSA 6600
`
`I NSA 5600
`I NBA 4600
`
`0 NSA 3600
`
`I NSA 2600
`
`I T2600
`
`I T2500 and T2500 Wireless
`I T2400 and T2400 Wireless
`
`I T2300 and T2300 Wireless
`
`I SOHO Wireless
`
`New features
`
`This section provides information about the new features in SonicOS 6.2.6.
`
`Topics:
`
`- About Capture ATP
`I About CFS 4.0
`
`SonicWalI-Finjan_00016707
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 4 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 4 of 18
`
`——
`
`About CFS 4.0
`
`Content Filtering Service [CFS] 4.0 has been redesigned to improve performance and ease of use. The
`workflow was redesigned and more accurate filtering options have been provided. Refer to SonicOS 6.2.6
`Content Filtering Service (CFS) 4.0 Feature Guide for more details. For information about upgrading from an
`older version of CFS, see the SonicOS 6.2.6 CFS 4.0 Upgrade Guide.
`
`Topics:
`o CFS workflow
`
`I CFS settings
`
`I New CFS policy design
`
`I CFS custom Categories
`
`I New objects in CFS 4.0
`
`o CFS log entries
`
`I Websense support in CFS 4.0
`
`I Deprecated CFS 3.0 features
`
`I Comparison of CFS 3.0 to CFS 4.0
`
`CFS workflow
`
`when processing packets, CFS follows this womflow:
`
`‘l
`
`A packet arrives and is examined by CFS.
`
`2 CFS checks it against the configured exclusion addresses, and allows it through if a match if found.
`
`3 CFS checks its policies and finds the first policy which matches the following conditions in the packet:
`I Source Zone
`
`I Destination Zone
`
`o Address Object
`
`I UsersiGroup
`0 Schedule
`
`0 Enabled state
`
`4 CFS uses the CFS Profile defined in the matching policy to do the filtering, and returns the
`corresponding operation for this packet.
`
`5 CFS performs the action defined in the CFS Action Object of the matching policy.
`
`6
`
`If no CFS Policy is matched, the packet is passed through without any action by CFS.
`
`SonioWaII-Finjan_00016708
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 5 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 5 of 18
`
`CFS settings
`The following global settings are used in CFS 4.0:
`
`I
`
`Global settings
`
`I Max URI Caches (entries) - Defines the maximum number of cached URI entries. Cached URl
`entries save the URI rating results, so that SonicOS does not need to ask the backend server for
`the rating of a known URI.
`In CFS 3.0, the cache size had a maximum; in CFS 4.0 the maximum is
`changed to the entry count.
`
`I Enable Content Filtering Service — This option can be cleared to bypass CFS for all packets. By
`default, it is selected.
`
`I Enable HTTPS content filtering .. When enabled, CFS first attempts to get the ServerName
`from the client “hello”. If that fails, CFS attempts to get the CommonName from the SSL
`certificate and then get the rating. If both attempts fail to get the ServerNamelComrnon Name,
`CFS uses the IP address for the rating.
`
`I
`
`Blocked if CFS Server is Unavailable — If the CFS server cannot provide the rating request
`within the specified duration (5 seconds by default}, this option defines whether to allow or
`deny the request.
`I CFS Exclusions
`
`I Exclude Administrator — When enabled, content filtering is bypassed for all requests from an
`account with administrator privileges.
`
`o Excluded address — Content filte ring is bypassed for all requests from address objects selected
`in the Excluded address list.
`
`- Custom Category
`
`I Enable CFS Custom Category — Allows the administrator to customize the ratings for specific
`URIs. When CFS checks the ratings for a URI, it first checks the user ratings and then checks the
`CFS backend server for the ratings.
`
`I Advanced Settings
`
`I Enable Smart Filtering for Embedded URL — When enabled, detects the embedded URL inside
`Google Translate thtps:Htranslate.google.coml and filters the embedded URI. too. Requires
`that client DPI-SSL be enabled also.
`
`I Enable Safe Search Enforcement — Enforces Safe Search when searching on any of the
`following web sites:
`
`o ww.yahoo.com
`I www.ask.com
`
`o ww.dogpile.corn
`
`o www.lycos.corn
`
`Requires that client DPl—SSL be enabled also.
`
`I Enable Google Force Safe Search — When enabled. overrides the Safe Search option for Google
`inside each CFS Policy and its corresponding CFS Action. Note that typically Safe Search happens
`automatically and is powered by Good, but when this option is enabled, SonicOS rewrites the
`Google domain in the DNS response to the Google Safe Search virtual IP address.
`
`I Enable YouTube Restrict Mode — When enabled, accesses YouTu be in Safety rnode. YouTube
`provides a new feature to screen videos that may contain inappropriate content flagged by users
`and other signals.
`
`I Enable Bing Force Safe Search — When enabled overrides the Safe Search option for Bing inside
`each CFS Policy and its corresponding CFS Action.
`
`SonicWalI-Finjan_00016709
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 6 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 6 of 18
`
`New CFS policy design
`A CFS policy defines the filtering conditions that a packet is compared to, and CFS 4.0 provides a new policy
`design, different from the way policies were implemented in CFS 3.0. A default policy is provided, but you can
`define your own. When writing your own policies, following matching conditions can be defined:
`I Name
`
`I Source Zone
`
`I Destination Zone
`
`a Source Address
`
`I UserSIGroup
`I Schedule
`
`I Profile
`
`I Action
`
`If a packet matches the conditions defined for Source Zone, Destination Zone, Address Object, Userstroups,
`Schedule, and Enabled state, it is filtered according to the corresponding CFS Profile and then the CFS Action
`is applied. If authentication data is not available during matching for UserslGroups, no match is made for this
`condition. This strategy prevents performance issues, especially when Single Sign-On is in use.
`
`Each CFS policy has a priority level and policies with higher priorities are checked first.
`
`CFS custom categories
`In CFS 4.0, CFS custom categories are handled consistently with the way ratings are handled in the CFS
`backend server. When adding or editing a custom category, you can select up to four categories for the URI.
`
`Besides adding custom category entries one by one, export and import functions are also supported. One way
`to use this functionality is by exporting the custom category first, editing it, and then importing from that
`exported file.
`
`Only the first 10,000 custom category entries in the file are imported. Invalid entries are skipped and do not
`count toward the maximum of 10,000 custom category entries that are supported.
`
`New objects in CFS 4.0
`Three new kinds of objects are supported in CFS 4.0:
`
`I URI List Objects - Defines the URI list which can be marked as allowed or forbidden.
`
`I CFS Action Objects — Defines what happens after a packet is filtered by CFS.
`
`I CFS Profile Objects — Defines what kind of operation is triggered for each HTTPIHTTPS connection.
`
`These objects are configured on the Firewall > Content Filter Objects page in the SonicOS management
`interface.
`
`URI List Objects
`
`In CFS 4.0, a URI List Object is used for URIIdomain matching. Each URl List Object contains a custom list of
`URls. You can addfeditldelete a CFS URI list object on the Firewall > Content Filter Objects page in SonicOS.
`
`Use the following guidelines when configuring URI List Objects:
`
`I A maximum of 128 URI list objects are allowed.
`
`I
`
`In each object, up to 5,000 URls are supported.
`
`I A URI is a string containing host and path. Port and other content are currently not supported.
`
`SonicWalI-Finjan_00016710
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 7 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 7 of 18
`
`I An IPv4 or IPv6 address string is supported as the host portion of a URI.
`
`I The maximum length of each URI is 255 characters.
`
`I The maximum combined length of all URIs in one URI list object is 131 ,072 [1024‘128] including one
`character for each new line {carriage return] between the URIs.
`
`I Each URI can contain up to 16 tokens. A token in URI is a string composed of the characters:
`[1 ._ (I!
`51“:
`
`n The maximum length of each token is 64 characters including one character for each separator [. or I}
`surrounding the token.
`
`I An asterisk [*I can be used as a wildcard representing a sequence of one or more valid tokens.
`
`When building a policy URI List Objects can be used as either the forbidden URI list or the allowed URI list. URI
`List Objects can also be used by the Web Excluded Domains of Websense.
`
`Action Objects
`The CFS Action Object defines what happens after a packet is filtered by CFS and specified by a CFS Policy.
`You can addieditl delete a CFS Action Object on the Firewall > Content Filter Objects page in SonicOS.
`Within the Action Object you can define whether to block a web site, require a passphrase {password} for
`aCcess, require a confirmation before proceeding to the web site, or use Bandwidth Management.
`
`Passphrase and Confirm features only work for HTTP requests. HTTPS requests cannot be redirected to the
`Passphrase or Confirm page, respectively.
`
`Profile Objects
`The CFS Profile Object defines the action that is triggered for each HTTP/HTTPS connection. You can
`addleditidelete a CFS Profile Object on the Firewall > Content Filter Objects page in SonicOS. When setting
`up a new Profile Object under the new design, a domain may now be resolved to one of four ratings. From
`highest to lowest, the ratings are:
`I Block
`
`I Passphrase
`- Confirm
`
`- BWM [Bandwidth Management}
`
`If the URI is not categorized into any of these ratings, then the operation is allowed.
`
`CFS log entries
`In CFS 4.0, there are only three types of log entries:
`
`I
`
`-
`
`I
`
`logstrSyslogWebSiteAccessed
`
`logstrWebSiteBlocked
`
`logstrCFSAlert — These log entries start with CFS Alert: and are followed by a descriptive message.
`
`SonicWalI-Finjan_00016711
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 8 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 8 of 18
`
`Websense support in CFS 4.0
`The Websense configuration settings are shown in the Security Services > Content Filter page when the
`Content Filter Type selection is set to Websense Enterprise. Websense only works for IPv4 requests. It does
`not work with IPv6.
`
`Websense can be used even when the firewall is not licensed for CFS 4.0 (Content Filtering Premium}.
`
`Deprecated CFS 3.0 features
`CFS 4.0 includes the following changes to CFS 3.0 features:
`
`- Merge "CFS via App Rules“ and “CFS via Zones" into one.
`
`o Remove the GloballLocal custom lists, replaced by URI List objects.
`
`0 Users cannot use CFS without a license, but can still use Websense.
`
`:- Remove CFS configuration from UsersIGroups CFS tab.
`
`I Remove CFS configuration from Zone page if using SonicWALL CFS. The CFS configuration in Zone is
`available only if CFS type is Websense.
`
`- Remove Restrict Web Features for JavaIActiveX. They can be replaced with entries in the Forbidden
`URI list using '-‘
`. ja- vs and * . 9-395.
`
`I Remove Restrict Web Features for HTTP Proxy Server.
`
`-
`
`In CFS 4.0, to block aCcess to H'I'TP Proxy Server, go to the Firewall > App Control Advanced page,
`enable App Control, and then edit the 3648 signature ID to block HTTP proxy aCcess.
`
`Comparison of CFS 3.0 to CFS 4.0
`The following table compares the user experience for various aspects of the old and new CFS.
`
`CFS 3.0 CFS 4.0
`
`Centralized CFS configuration in one place.
`Configu re CFS on CFS page, Zone page, User page
`and App Rules page.
`
`Two modes [via Zones and via App Rules}.
`
`Merged functions into one mode.
`
`Admin cannot predict the filtering results accurately Admin can exactly predict the filtering results.
`after configuration.
`
`Need to define duplicated filtering options.
`
`Define CFS Category object, URI List object, Profile
`object and Action object, which can be reused in
`multiple policies.
`
`Does not support wildcard matching.
`
`Supports wildcard {*l matching for URI List.
`
`Consent feature is global.
`
`Consent feature is per policy.
`
`BWM is only supported in App Rules mode.
`
`BWM is fully supported.
`
`Does not support Override — Confirm.
`
`Supports Override — Confirm.
`
`Only supports GET, POST and HEAD commands for
`HTTP.
`
`Supports GET, HEAD, POST, PUT, CONNECT,
`OPTIONS, DELETE, REPORT, COPY and MOVE
`commands.
`
`Cannot enablefdisable CFS globally.
`
`Can enablea‘disable CFS globally.
`
`Custom category is based on category.
`
`Custom category is based on domain, which is more
`intuitive.
`
`Separate Websense configuration from CFS
`Websense configuration is mixed with CFS
`
`configuration. configuration helps prevent errors.
`
`SonicWaII-Finjan_00016712
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 9 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 9 of 18
`
`Resolved issues
`
`The following issues are resolved in this release.
`
`App Rules
`
`Resolved issue
`
`An App Rule of SMTP Client type with File extension as Match Object does not block
`matching emails when used with SMTPS.
`
`Occurs when Client DPl-SSL and Application Firewall are enabled and the App Rules
`policy uses a Match Object Type: File extension, Content: exe,txt,jpg, and then
`email is sent from a client with txt or jpg files in the attachment. It works fine if
`Client DPl-SSL is not enabled.
`
`Issue ID
`
`175840
`
`High Availability
`
`
` Resolved issue Issue ID
`
`A High Availability pair of NSA 46005 experience frequent HA Failoveri Failback
`events.
`
`174010
`
`Occurs when Physical Monitoring is enabled only on the X0 interface. and the active
`firewall detects a better link status on the idle firewall, in conjunction with the LDAP
`task waiting for too long for a lock to be released.
`
`Synchronizing settings causes the Network > Portshield Groups page on the standby
`unit to be refreshed continuously.
`Occurs when there are X1052 and X1008 X-Series switches on a T2 series appliance.
`Without deleting either switch from the configuration, the X1008 switch is physically
`removed. The primary unit shows the correct status of both switches. On the High
`Availability > Advanced page, the Synchronize Settings button is clicked. The
`secondary unit reboots after synchronization, but the Network > PortShield Groups
`page refreshes continuously.
`
`170876
`
`A client using SSL VPN NetExtender fails to connect to the active unit of an HA Pair
`after a fai lover and failback.
`
`167227
`
`Occurs when the client is connected using SSL VPN NetExtender, then the Force
`ActiveIStandby Failover option is used to force a failover and the client is
`disconnected, but is able to reconnect, and then the same option is used to force a
`failback to the primary firewall. The client is disconnected and gets a “connection
`failed” error when attempting to reconnect.
`
`Networking
`
`Resolved issue
`Issue ID
`
`
`VLAN interfaces and subsequent VPN tunnel policies are not created.
`Occurs when importing a configuration file from an NSA 5600 firewall to an NSA 6600
`firewall.
`
`iCMPv6 service group shows inconsistent member objects.
`Occurs when editing the factory default ICMPvé group [Network 3‘ Services 3‘ Service
`Groups > Edit ICMPvG}. In the factory default state, about 30 service objects are
`shown as members of the lCMPvt’: group. Any attempt to editladd to this group results
`in errors [unable to find network object], deleted members, and an inability to add
`any subtype ICMPv6IND members (ports 141 through 154].
`
`173505
`
`168831
`
`SonioWall-Finjan_00016713
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 10 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 10 of 18
`
`System
`
`Resolved issue
`Issue ID
`
`
`The active firewall in a High Availability pair goes down with memory errors on the
`data plane.
`
`175380
`
`Occurs when Single Sign‘On users are authenticating over HTTP, and enterprise data
`center traffic is passing through the HA pair.
`
`User Interface
`
`Resolved issue
`
`Options for PoE are displayed for non-POE X-Series extended switches.
`Occurs when configuring a non~PoE extended switch. Options for PoE display on the
`Advanced tab of the Add External Switch dialog.
`
`Dynamic pages, such as Dashboard > Log Monitor, Network > Address Objects, or
`Network > NAT Policies, cannot be loaded with Microsoft Edge browser.
`Occurs when the Microsoft Edge browser is used. If the browser window is
`maximized, the page is blurred; if the browser window is not maximized, the page
`disappears.
`
`Users
`
`Issue ID
`
`1715?3
`
`169277
`
`Issue ID
`Resolved issue
`
`
`The domain element of logged in users is not displayed on the Users > Status page if a
`very large number of users are authenticated using Single Sign—On. and a warning is
`displayed, “Attempt to free already freed entry 0x35d4f2d8 to UserlpDomain free
`list!”.
`
`174654
`
`Occurs when the maximum allowed number of users [100,000 in this case] are
`authenticated using 550 on the appliance, with about two thirds of them (65,535]
`authenticated to the same domain, and then some of those users log out, causing the
`domain element to stop being displayed for the remaining users in that domain. After
`more users log out, the warning is displayed.
`
`VPN
`
`Resolved issue
`Issue ID
`
`
`A VPN tunnel policy cannot be established.
`
`175975
`
`Occurs When the tunnel is bound to a DHCP WAN interface that is not in the WAN
`Load Balancing {WLBI group and the system is rebooted.
`
`The Allow Advanced Routing option should not be displayed on the Site—tO‘Site VPN
`policy configuration window.
`
`175850
`
`Occurs when configuring a Site-to-Site VPN policy and viewing the Advanced tab. This
`option should only be displayed for a Tunnel Interface policy.
`
`Unable to add a manual key.
`Occurs when attempting to add an IPv6 manual key on the VPN > Settings 3» VPN
`Policy dialog.
`
`Any unnumbered tunnel interface with dynamic routing is not retained during an
`upgrade.
`Occurs when SonicOS 6.x is upgraded to Sonicos 6.2.5.1.
`A VPN tunnel interface cannot be deleted.
`
`170547
`
`169993
`
`169627
`
`Occurs when a VPN policy of type tunnel interface is configured and then a VPN
`tunnel interface with that name is configured. After upgrading to 6.2.5.1, the VPN
`tunnel interface cannot be deleted as the name has been lost during the upgrade.
`
`SonicWalI-Finjan_00016714
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 11 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 11 of 18
`
`Wireless
`
`Resolved issue
`Issue ID
`
`
`The guest login status window with the Logout button is still displayed although the
`option to display it is disabled.
`Occurs when Wireless Guest Services is enabled and the ”Show guest login status
`window with logout button” option is not selected on the Users > Guest Services
`pageI and then a wireless client Logs in.
`
`Authentication for a SonicPoint ACelACi/NZ cannot be changed directly.
`Occurs when changing the authentication type from WPA2 - EAP to WEP - Shared Key
`by configuring the profile for a SonicPoint ACefACiINZ.
`Workaround: Change the authentication type from WPA2«EAP to WEP-Both (OPEN
`System and Shared Key]. And then, change the authentication type to WEP-Shared
`Key.
`
`175286
`
`171722
`
`Known 1 ss ues
`
`The following are known issues in this release.
`
`3GJ4G
`
`Known issue
`Issue ID
`
`
`The Connect on Data mode is not Working for 36 cards, causing traffic to stop passing
`and no Internet access due to an unsuccessful failover to WWAN after the WAN
`interface is disconnected.
`
`175877
`
`Occurs when a 36 card is connected to the U0 port, U0 is configured in Connect on
`Data mode as the final backup for the WAN {X1} interface, traffic is passing from a
`client system on the LAN side to the WAN and then the X1 interface is disconnected.
`
`Some China-Huawei 36 cards do not connect after the primary WAN interface goes
`down.
`
`175146
`
`Occurs When 36 is configured as final backup in DoD mode, While using a China—
`Huawei 36 card, including the Huawei E398 card with China Unicorn SIM card and the
`Huawei EC169C card with China Telecom SIM card.
`
`Website access over ATEtT Beam and AT&T Momentum 46 USB modem cards fails with
`a connection reset page. Other traffic types succeed, including ping, telnet, and
`nslookup.
`
`168487
`
`Occurs when accessing the Internet over the WAN interface while either of these
`AT&T cards is connected to the U0 port. This issue occurs because the Maximum
`Transmission Unit {MTUi changed from 1500 to 40 in the AT&T network.
`
`AppFIow
`
`Known issue
`Issue ID
`
`
`The GMS flow server continues to send flow data to Agent 1 after updating the
`configuration to use Agent 2.
`
`175592
`
`Occurs when Apply is not clicked after updating the configuration to use Agent 2.
`
`SonicWalI-Finjan_00016715
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 12 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 12 of 18
`
`App Rules
`
`Resolved issue
`Issue ID
`
`
`Policies with match objects are not enforced.
`
`173739
`
`Occurs when the match object size is greater than 150 bytes.
`
`Capture ATP
`
`Known issue
`
`The scanned files are truncated and the firewall log shows “File truncated due to
`highly delayed acks”, but the scan history shOWs all 45 files scanned with result
`clean.
`
`Occurs when sending a PDF file with IMAP protocol as an attachment through a VPN
`tunnel interface.
`
`Issue ID
`
`176213
`
`Some file uploads result in a "highly delayed acks” response and do not receive the
`expected receipt confirmation from the cloud servers.
`
`175967
`
`Occurs when the number of files uploaded for analysis exceeds the concurrent files
`limit for the platform. On a platform supporting 25 concurrent files, if 50 files are
`uploaded for analysis, a “highly delayed acks” response is received for two of them.
`
`The Gateway Anti-Virus status says, "Gateway Anti-Vims Status: File sent to Sandbox,
`but could not confirm receipt due to highly delayed acks".
`Occurs after sending a file to the Capture ATP cloud sewers for analysis.
`
`175415
`
`DPl-SSL
`
`Known issue
`Issue ID
`
`
`The HTTPS service object is not correctly excluded by Client DPI-SSL.
`
`175696
`
`Occurs when the firewall is deployed between an HTTPS proxy server and a client
`system, the proxy server is configured in the client browser, Client DPIvSSL is enabled
`along with the Deployments wherein the Firewall sees a single server IP for
`different server domains, ex: Proxy setup option , HTTPS is selected in the Client
`DPI-SSL Exclude drop-down for Service Objecthroup, and then the user accesses
`some online banking websites which are not excluded as expected, but are decrypted
`by DPl-SSL and the certificates are re-issued by SonicWALL. If proxy is not set in the
`client browser, those sites are correctly excluded from DPl-SSL.
`
`Log
`
`Known issue
`Issue ID
`
`
`The Web Site Hits table is always empty in the Log : Reports page.
`
`176224
`
`Occurs when clicking the Start Data Collection button on the Log 2» Reports page and
`then running LAN to WAN HTI'FU‘H'ITPS web browsing traffic.
`
`Networking
`
`Known issue
`
`SonicOS does not display the teamed OSPF network in either the OSPF routing table
`or in the IP routing table.
`
`Occurs when the interface on the area border router {AER} for the area including the
`firewall is configured as passive.
`
`Issue ID
`
`175469
`
`SonicWalI-Finjan_00016716
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 13 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 13 of 18
`
`Issue ID
`Known issue
`
`
`The tunnel interface name is not displayed in the connection monitor table after
`traffic passes through an unnumbered VPN tunnel interface.
`
`175449
`
`Occurs when a tunnel interface VPN policy is added and a static route going through
`this VPN tunnel interface is added, and then traffic is sent to the destination.
`
`Traffic fails on 1OGb interfaces that are changed from Wirernode in a High
`Availability pair.
`
`175333
`
`Occurs when X18 and X19 are configured as Wirernode pair interfaces in inspect mode
`and traffic is passing, and then X18 is unassigned, then assigned to the LAN zone as a
`static interface and a DHCP server is bound to it. After a client PC connected to X18
`renews its DHCP lease, traffic to the WAN fails and pings from the client PC are not
`received.
`
`The link status between a T2 appliance and a Dell X-Series switch displays “no link”.
`
`175205
`
`OCcurs when changing the link settings to 100 Mbps Full-Duplex with one switch using
`an Isolated Link configuration or with two switches using a Common Link
`configuration.
`
`The FQDN resolved results are not synchronized on the firewalls in an HA pair.
`
`174716
`
`Occurs when a firewall in an HA pair is idle and Stateful Synchronization is enabled.
`
`Auto-added route entries for the WAN are disabled and dimmed in a firewall
`
`173703
`
`configured with a redundant WAN port.
`
`Occurs when WAN port goes down but its redundant port is still up, and then the
`firewall is restarted.
`
`Security Services
`
`Issue ID
`Known issue
`
`
`Workstations cannot communicate with Windows Shared Folders. Files cannot be
`copied, and this GAV alert is generated, “5MB out of order readlwrite”.
`
`175366
`
`Occurs When the CIFSINetbios option is enabled on the Security Services > Gateway
`Anti -Virus page. Communication works after disabling CIFS! Netbios.
`
`Gateway Anti -Virus does not correctly block a malicious email attachment.
`Occurs when using Thunderbird as the email client to download email from an IMAP
`server on the WAN, and email with a malicious attachment is downloaded.
`
`174499
`
`Switching
`
`Known issue
`Issue ID
`
`
`The L2 LAG members are not aggregated on the VLAN trunk ports, and traffic is
`blocked.
`
`175363
`
`Occurs when PortShield and L2 LAG are configured on the VLAN trunk, and the
`firewall is restarted.
`
`A VLAN interface bound to a Trunk interface cannot be deleted, and the Switching >
`VLAN Trunking page only shows the first 32 configured VLAN interfaces.
`
`175229
`
`Occurs When more than 32 VLAN interfaces are configured on the Trunk interface,
`and the one to be deleted is not displayed on the Switching > VLAN Trunking page.
`
`The L2 Link Aggregation Group {LAG} function does not respond.
`
`175152
`
`Occurs when creating a new LAG group, and the aggregator port link is down, and the
`primary WAN is in Round Robin mode.
`
`SonicWalI-Finjan_00016717
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 14 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 14 of 18
`
`Syslog
`
`Known issue
`Issue ID
`
`
`Syslog messages for both admin and user login sessions show “dur=0”, instead of the
`actual duration of the login. This causes SonicWALL GMS to dispiay zeros for the login
`session duration.
`
`175823
`
`Occurs when capturing and viewing the syslog messages that are sent to GMS, and
`when viewing the login durations in GMS.
`
`System
`
`Known issue
`Issue ID
`
`
`Sending diagnostic reports to Support can cause the SonicOS management interface
`to become unresponsive for up to 15 minutes.
`
`175969
`
`Occurs when the Send Diagnostic Reports to Support button is clicked on the System
`> Diagnostics page.
`
`The Enable FTP 'REST' requests with Gateway AV option in the Gateway Anti-Virus
`settings is not turned on after enabling DPI and Stateful Firewali Security.
`
`175100
`
`Occurs when GAV is licensed but disabled with all options disabled, and then the DPI
`and Stateful Firewall Security button is clicked on the System > Settings page and
`the firewall restarts.
`
`The Enable HTTP Byte-Range requests with Gateway AV option in the Gateway
`Anti-Vims settings is not turned on after enabling DPI and Stateful Firewall Security.
`
`175098
`
`Occurs when GAV is licensed but disabled with all options disabled, and then the DPI
`and Stateful Firewall Security button is clicked on the System > Settings page and
`the firewall restarts.
`
`Connections do not update their configurations.
`
`175006
`
`Occurs when Enable Stealth Mode and Randomize lP ID are enabled, and Decrement
`1P TTL for forwarded traffic is disabled, and Maximum DP! Connections is set with DPl
`services enabled.
`
`Users
`
`Known issue
`Issue ID
`
`
`Local users with Limited Administration rights and local users who are part of the
`Read-only Administrators group cannot access the SonicOS management page, but are
`redirected to an authentication page.
`
`175973
`
`Occurs when the local users also belong to the Guest Services group, and Guest
`Services is enabled in the LAN zone, and the user attempts to log into the appliance
`and clicks the Manage button.
`
`RADIUS or LDAP authenticated user sessions remain active after clicking the Logout
`button.
`
`175765
`
`Occurs when a user on the LAN side attempts to access the Internet through the
`firewall and logs in when the login redirect window is displayed and then clicks the
`Logout button. When the Users > Status page is checked, the Active User Sessions
`table still shows the user session as active, and the user can continue to access the
`Internet from the same computer without being required to log in again.
`
`SonicWalI-Finjan_00016718
`
`

`

`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 15 of 18
`Case 5:17-cv-04467-BLF Document 320-10 Filed 12/02/20 Page 15 of 18
`
`VPN
`
`Known issue
`Issue ID
`
`
`The Apply NAT Policies option cannot be enabled in a VPN policy of type Tunnel
`Interface, preventing NAT policies from being applied over the unnumbered tunnel
`interface.
`
`175882
`
`Occurs when the VPN policy is added with the Apply NAT Policies option enabled, but
`when verifying it, the checkbox for Apply NAT Policies is not selected and it cannot
`be enabled.
`
`Traffic over a numbered tunnel interface fails after upgrading the appliance
`firmware.
`
`175845
`
`Occurs when the firewall is upgraded from SonicOS 6.2.4.2 to 6.2.5.1 or 6.2.6.0.
`
`Workaround: After importing configuration settings from a firewall running 6.2.4.2
`to a firewall running 6.2.5.1 or 6.2.6.0, manually recreate the VPN Tunnel Interface
`{numbered tunnel interface}, the route entries, and the firewall access rules.
`
`Connecting via SSH to a firewall with a VPN tunnel set up results in the error
`message, "maximum number of ssh sessions are active, please try again late r”.
`Occurs when a site-to-site VPN tunnel is active between two firewalls and four SSH
`sessions are started on one of the firewalls, then the VPN tunnel is disabled followed
`by exiting all SSH sessions, and then the VPN tunnel is reconnected and the
`administrator attempts to connect via SSH again.
`
`175610
`
`Wireless
`
`Known issue
`
`The beacon interval for a SonicPoint Virtual Access Point (VA?) is affected by the
`beacon interval set for an internal wireless VAP. The error message "Error: Too small
`802.11 Beacon Interval for Virtual Access Point” is displayed upon moving more than
`four VAP objects into a Virtual Access Point Group.
`
`Occurs when a SonicPoint is connected to a T2 Wireless appliance which has its
`wireless radio enabled with the Internal AP Group configured as the Virtual Access
`Point Group, and the beacon interval is set to a value such as 400 milliseconds on the
`Wireless ) Advanced page. The SonicPoint is connected to a WLAN interface of the TI
`and its beacon interval is set to a different value, such as 600 mi

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket