Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

Resolved Issues

 

This section lists the issues fixed in hardware and software in Junos OS Release 15.1X49-D190. For information about resolved issues in Junos OS Release 15.1X49-D10 through Junos OS Release 15.1X49-D180, refer to the Release Notes listed in the Release 15.1X49 section.

For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.

Application Layer Gateways (ALGs)

  • On SRX Series devices with H.323 ALG traffic and source NAT enabled, if H.323 packets pass the same SRX Series device twice through different virutal router instead of logical system (LSYS), source NAT connection might fail and the H.323 connection cannot be established successfully. PR1436449

Application Security

  • If automatic application-identification download is configured with a start-time specified, the automatic download stops when the time has progressed to the next year and a reboot is done before the start-time is reached that year. PR1436265

Flow-Based and Packet-Based Processing

  • The l2cpd process leaks memory if the Layer 2 learning process is disabled. PR1336720

  • Juniper Sky ATP does not escape the \ inside the username before the metedata is sent to cloud. PR1416093

  • When a GRE tunnel (GRE-over-IPsec tunnel) or IPsec tunnel is used on an SRX Series device, the MTU of the tunnel interface is calculated incorrectly (24 bytes less than the expected value). PR1426607

  • The flowd process might stop in the SRX5000 line of devices. PR1430804

  • On SRX5400, SRX5600, SRX5800 platforms acting as a middle device between Internet Key Exchange (IKE) peers, it is not able to establish more than one Encapsulating Security Payload (ESP) session between two IPv6 IKE peer if the IKE ALG is enabled on the middle SRX device. PR1435687

Intrusion Detection and Prevention

  • IDP install fails on one node due to AppID process gets stuck. PR1336145

J-Web

  • In SRX highend devices chassis cluster setup, node1 is not avialable for monitoring using J-Web. PR1443819

Network Management and Monitoring

  • On SRX Series devices, the result of MIB OID dot3StatsDuplexStatus shows full duplex for the interface which the status is half duplex due to auto negotiation failure. PR1409979

Platform and Infrastructure

  • Packet Forwarding Engine might stop functioning on SRX1500 platform when the secondary node gets power-off on chassis cluster. PR1431380

  • A false license alarm might be seen even if there is a valid license. PR1431609

  • SRX550M running Junos OS Release 18.4R1 shows PEM 1 output failure message, whereas with Junos OS Release 15.1X49 or Junos OS Release 18.1R3.3 it does not show any alarms. PR1433577

  • On SRX4100, SRX4200 and SRX4600 platforms, if LACP is configured on the reth interfaces and chassis cluster is used, the interface using LACP flaps when Routing Engine is busy. PR1435955

  • Security logs cannot be sent to an external syslog server through TCP. PR1438834

  • The flowd process stops on SRX550 or SRX300 line of devices when an SFP transceiver is plugged in. PR1440194

  • On SRX1500 platform, when interface is changed from access mode to MVRP trunk port, traffic will be blocked and dynamic VLAN can't be learned. As a workaround, reboot the device or srxpfe after configuration, or by change access mode to trunk mode first, then change to MVRP trunk port. PR1438153

  • The show security flow session command fails, generating an error message, when an SRX4100 or SRX4200 has around 1 million routing entries in the FIB. PR1445791

  • On SRX550M devices, when encapsulation flexible-ethernet-services is configured together with the LACP protocol on an aggregated Ethernet interface, the interface does not come up. PR1448161

Routing Policy and Firewall Filters

  • SRX1500 devices allow only a maximum of 256 policies with counting enabled. PR1435231

Unified Threat Management (UTM)

  • SRX Series: srxpfe process crash while JSF/UTM module parses specific HTTP packets (CVE-2019-0052). PR1406403

VPNs

  • The kmd process stops and generates a core file after running the show security ipsec traffic-selector command is issued. PR1428029