Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

Known Limitations

Learn about known limitations in this release for SRX Series Firewalls.

For the most complete and latest information about known Junos OS defects, use the Juniper Networks online Junos Problem Report Search application.

Platform and Infrastructure

  • When MLD snooping is configured on SRX1600, SRX2300, and SRX4300 devices, the membership table is not updated with the corresponding MLD interface and group information. As a result, multicast traffic may experience impacts due to incomplete membership data. PR1828211

  • An Authentication Bypass by Spoofing vulnerability in the RADIUS protocol of Juniper Networks Junos OS and Junos OS Evolved platforms allows an on-path attacker between a RADIUS server and a RADIUS client to bypass authentication when RADIUS authentication is in use. Refer https://supportportal.juniper.net/JSA88210. PR1850776

VPNs

  • We recommend you to use load update instead of load override command for any config update to prevent undesirable behaviour. In case of load update, the mgd sends an update to the respective daemons for only the changed configuration whereas in case of load override, the MGD sends a DELETE-ALL followed by ADD operation for all the configuration irrespective of whether it got changed or not across the load override operation. If the user still wants to use load override for config change operation on a MNHA setup and if it changes the high-availability mode after the commit, then the user should ideally reboot the respective nodes as per the following warning message to avoid such issues: "warning: High Availability Mode changed, please reboot the device to avoid undesirable behavior". PR1858312