Bug Fixes:
- Fixed the device crash issue
- Fixed an issue where the inbound block firewall rule must configure the LAN Server IP address.
- Fixed an issue where the deleted VPN client still can connect a VPN tunnel to the device
- Fixed the issue where the custom ports does not work with QoS rules.
Known Issues and limitations:
- Unable to add IP address or network in by source IP address page.
- Observed inconsistent behavior with voice traffic when server is lying in LAN and DMZ side.
- Device showing blank certificate when subject name is having successive comma.
- For the port speeds 10Base T FULL_Duplex and 100Base T FULL_Duplex, the duplex setting is showing as half.
- [CLI]Able to add 2 mode config records with same pool start IP and end IP.
- Device is accepting same Local and Remote LAN IP in manual tunnel.
- When "Disable Ping Reply on LAN Ports" is enabled the WAN IP of router is not reachable from the LAN host.
- No NAT translation of SIP headers during REGISTER, outbound call and SDP.
- There is no validation for SIIT Address field.
- IPv6 IPSec client tunnel is not getting establish in main mode.
- Device is not accepting the static route for the network 0.0.0.0 on LAN or VLAN interface.
- [IPv6]Unable to run IPERF-UDP and FTP traffic from LAN to WAN on SIIT tunnel.
- Stun packets are getting drop in SIP module.
- Device IPv6 WAN is not getting RADvD IP address when Router's MAC Address is configured for "Use this computer's MAC Address" or "Use this MAC Address".
- [CLI]There are no proper validations for the domain name in CLI.
- [CLI]schedules are not getting edited properly from CLI.
- Able to see wireless logs with "local wireless" tag and with "kernal kernal" tag.
- After Successful connection through WPS PIN method, status message is not correct.
Note:
- Support 50 VoIP phone calls.
- Supported characters: `~!#$&*()-+|\;:' " < > and space. Restricted these characters in password fields due to security reasons [to avoid the SQL attacks etc.,].
To Upgrade
IT IS VERY IMPORTANT TO NOT POWER-CYCLE THE UNIT BEFORE THE UPGRADE COMPLETES! IF YOU DO INTERRUPT THE UPGRADE, THE ROUTER WILL BE RENDERED USELESS!
- Using the Download Link below, download and extract the new firmware to a convenient place such as your desktop. The filename after extracting is FVS318N_v4.3.5-3.img
Download Link: http://www.downloads.netgear.com/files/GDC/FVS318N/FVS318N_V4.3.5-3.zip
- Using a browser, login to the router as admin.
Note: Reboot the firewall before beginning the update process.
- Select Administration > Settings Backup and Firmware Upgrade from the main/submenu.
- In the Router Upgrade section, click Browse.
- Locate the downloaded file and click Upload.
This will start the software upgrade to your VPN firewall. During the upgrade process, the Settings Backup and Firmware Upgrade screen remains visible and a status bar shows the progress of the upgrade process. The upgrade process can take up to 10 minutes. When the status bar shows that the upgrade process is complete, it can take another 10 minutes before the wireless VPN firewall reboots.
- When the reboot process is complete, log in to the wireless VPN firewall again. (If you can see the unit: The reboot process is complete when the Test LED on the front panel goes off.)
- Select Monitoring. The Router Status screen displays, showing the new firmware version in the System Info section of the screen.