SonicOS 7.0.1 Release Notes
- SonicWall SonicOS 7.0.1
- Version 7.0.1-5161 July 2024
- Version 7.0.1-5151 March 2024
- Version 7.0.1-5145 November 2023
- Version 7.0.1-5129 June 2023
- Version 7.0.1-5119 June 2023
- Version 7.0.1-5111 April 2023
- Version 7.0.1-5100 March 2023
- Version 7.0.1-5095 November 2022
- Version 7.0.1-5083 September 2022
- Version 7.0.1-5080 September 2022
- Version 7.0.1-5072 June 2022
- Version 7.0.1-5030-R945 May 2022
- Version 7.0.1-5065 April 2022
- Version 7.0.1-5054 April 2022
- Version 7.0.1-5052 April 2022
- Version 7.0.1-5030 December/October 2021
- Version 7.0.1-5026 September 2021
- Version 7.0.1-5023 August 2021
- Version 7.0.1-5019 August 2021
- Version 7.0.1 July 2021
- Version 7.0.1 June 2021
- Version 7.0.1 April 2021
- SonicWall Support
Version 7.0.1-5129 June 2023
June 2023
This version of SonicOS 7.0.1 (7.0.1-5129) is a maintenance release for currently shipping NSsp 15700 platforms and resolves issues found in previous releases.
Supported Platforms
This release applies only to the NSsp 15700 platform.
For information about the latest release related to other platforms, please see Version 7.0.1-5119 June 2023.
Resolved Issues
Issue ID | Issue Description |
---|---|
GEN7-21392 | The Real Time Monitor does not display all of the actual traffic going through the firewall. |
GEN7-30560 | Users accessing WAN from LAN using a security rule containing group Everyone displays an undetermined error when trying to change the password after logging in. |
GEN7-32261 | OSPFv3/RIPng]OSPFv3/RIPng cannot be established over trunked VLAN or sub-VLAN interfaces. |
GEN7-33585 | IPv6 VPN does not work when using a VLAN interface. |
GEN7-33914 | The value of OSPF interface Auto-Cost is incorrect for 40G interfaces. |
GEN7-34690 | The Resolved Address is not displayed even when the domain is resolved using the IPv6 DNS server. |
GEN7-35241 | If two IPv6 WAN interfaces are configured, configuring the second
interface in IPv6 static mode results in the error: Command 'dns primary
xxxxx::xxx:xxxx:xxxx::xxxx' does not match . |
GEN7-36708 | Unable to load a build or exp file when doing out-of-band management using the MGMT port. A different port needs to be used for out-of-band management or the system used by the administrator needs to be in the same subnet as the MGMT port. |
GEN7-37068 | System logs and event logs are not being processed for Website Blocked when Stealth Mode is enabled. The counter remains at 0. |
GEN7-37135 | LDAP sync fails while waiting for a reply from the LDAP server. |
GEN7-37387 | In an High Availability environment, the internal default OSPF route disappears from the active firewall when OSPF has been configured with LSA tracking for the default route and default-information originate always is selected. |
GEN7-37454 | Dynamic routes are deleted on Slave blades for active firewall after disabling Stateful Synchronization option. The packets are dropped due to IP Spoof check error. |
GEN7-37862 | Syslog packets are not generated over a VPN tunnel when two syslog servers have been enabled. |
GEN7-38631 | The High Availability link may not come up intermittently after upgrading the firmware. |
GEN7-39016 | The Arp Entry is not clear after it reaches after the counter reaches 0 minutes. |
GEN7-39744 | Traffic is forwarded when a security rule set to Deny/Discard in Wire Mode. |
GEN7-39788 | Under some conditions, the Content Filtering Service (CFS) will not block a Deny rated domain when a TCP Window Update packet is received after the connection. Instead, the policy engine will perform policy lookup processing without the URL and the ratings information. |
GEN7-39993 | Packets matching a Security Policy with Action Profile set to SSO Bypass reports Packet Dropped - policy user sso needed in the log. This can be a false-positive that can lead to confusion. |
Additional References
GEN7-40253, GEN7-40248, GEN7-40002, GEN7-39528, GEN7-39387, GEN7-39193, GEN7-39153, GEN7-38709, GEN7-38691, GEN7-38652, GEN7-38422, GEN7-38388, GEN7-38158, GEN7-38149, GEN7-38134, GEN7-38050, GEN7-37947, GEN7-37945, GEN7-37900, GEN7-37854, GEN7-37418, GEN7-37346, GEN7-37204, GEN7-37123, GEN7-37094, GEN7-37071, GEN7-35813, GEN7-35774, GEN7-35643, GEN7-34016, GEN7-33917, GEN7-33201, GEN7-31788, GEN7-31530, GEN7-31423, GEN7-31132
Known Issues
Issue ID | Issue Description |
---|---|
GEN7-35781 | Adding an ECMP route with tunnel VPN as the last interface fails when the Gateway Number is 3 or 4. |
GEN7-36684 | A design change now allows special management (no user policy required) only using the MGMT port on appliances that do not have a management port. For the appliances that have a management port, the user will need to add an explicit management rule to allow management service on a non-management port. Administrators must create an allow rule to allow management services using non-management ports (such as X0 and X1) and enable the corresponding management service on each of the interfaces. |
GEN7-40273 | Management is allowed using HTTPS/SSH through a site-to-site VPN policy when HTTPS/SSH Management via this SA is disabled in the VPN policy |
GEN7-40300 | When changing the SSLVPN client Network Address IPV4 pool, the change may intermittently not be completed even when it shows that change was successful. |
GEN7-40369 | An error may be displayed when clicking the Apply button on the LDAP Mirror configuration page in a High Availability configuration when a valid local certificate is removed from the firewall, but the association of the certificate is not removed from the Local TLS Certificate in the LDAP Base payload. |
Was This Article Helpful?
Help us to improve our support portal