Release Notes PN 93000696_A1 Connect WAN VPN 82001662_A1 EOS July 21, 2008 INTRODUCTION This is a production release of firmware for Digi's Connect WAN VPN product line. The Connect WAN VPN family, part of the Digi Remote Site Management line of products, provides an alternative to traditional wired TCP/IP Wide Area Networks (WANs), utilizing global wireless Cellular, and IPSec VPN technology to create secure primary and backup network connectivity. They offer an easy, cost-effective, means of securely connecting virtually any remote location or device into the corporate IP network. SUPPORTED PRODUCTS Connect WAN VPN 1X Connect WAN VPN Edge Connect WAN VPN GPRS Connect WAN VPN GSM-R SUPPORTED AIR INTERFACES Kyocera M200 (CDMA 1X) Siemens MC75 (Edge) Siemens TC75 (GPRS) Siemens MC55 (GSM-R) ENHANCEMENTS Add support for the Siemens MC55 (GSM-R) air interface card. Add "show ddns" to the list of commands run by "display techsupport". (25725) BUG FIXES Remove the VPN "interfaces" (vpn0, etc.) from the list of valid interfaces for configuring a static route. These are not true network interfaces in Digi's network stack. They are not suitable for static routes, since only IPSEC policies may be used for the purpose of routing packets through tunnels. These VPN pseudo-interfaces are meaningful only for the VPN "Virtual Host" mode. KNOWN ISSUES Problems have been encountered with some Linksys VPN appliance models when using different Diffie-Hellman group settings for phase 1 and phase 2. To work around this issue and successfully establish the VPN tunnel, use the same Diffie-Hellman group for both phase 1 and phase 2 settings. DOCUMENTATION ERRATA None. ADDITIONAL INFORMATION It is recommended that you perform a backup of your device's settings prior to upgrading your firmware. If you should need to revert back to a previous version of firmware, this will ensure that you will be able to restore your device to its previous settings in the event that some settings are not restored properly after downgrading the firmware. To backup your device settings, follow this simple procedure: 1) Open the web user interface and navigate to the "Administration" section and select "Backup/Restore". 2) Click the "Backup" button and select the location to where you want to save your backup file. To restore: 1) Navigate to the same section within the web UI. 2) Click the "Browse" button to select the backup file you saved in the previous steps. 3) Click the "Restore" button to upload the configuration settings contained in your backup file. On initial boot of this device, it will generate some encryption key material: an RSA key for SSL/TLS operations, and a DSA key for SSH operations. This process can take as long as 40 minutes to complete. Until the corresponding key is generated, the device will be unable to initiate or accept that type of encrypted connection. It will also report itself as 100% busy but, since key generation takes place at a low priority, the device will still function normally. On subsequent reboots, the device will use its existing keys and will not need to generate another unless a reset to factory defaults is done, which will cause a new key to be generated on the next reboot. HISTORY 82001662_A1 (2.7.0.20) - July 21, 2008 See ENHANCEMENTS and BUG FIXES information above. 82001662_A (2.7.0.18) - February 12, 2008 Initial release.