Alcatel-Lucent IPSec Client 9.2.0 Release notes
Copyright@ 2007 Alcatel-Lucent
May 2007
These release notes describe Lucent IPSec Client 9.2.0 Release.
Specific information is provided for the following topics.
Top of page
Noteworthy changes in version 9.2.0 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
-
Using new icons, names, titles to reflect the Alcatel-Lucent intellectual property and ownership of IPSec Client.
-
Starting from 9.2.0, Alcatel-Lucent IPSec Clients do not support Windows 98, Windows NT and Windows Me,
the early versions of Windows platforms, any more.
New features in 9.2.0 release:
-
Add new end-users security enforcement policy. Company may need to force a certain application to be
run whenever a user connects to the corporate network. This application may control such things as
inventory management, and patch management, as well as meet certain legal requirements such as having a
user agree to a set of conditions prior to connecting to the corporate network. In some case, access to
the network must be denied if this application does not complete successfully, either because it generates an error
or because it does not exist. Additionally, these actions can be controlled on a per authentication
basis, as various combinations of user, client OS, and client versions will have different defined applications
and/or actions on error or failure.
-
Client now can download CRL list (file) when machine's LAN Settings is using Automatic configuration options in addition to
the Proxy server settings. It is either 'Automatically detect settings' or 'Use automatic configuration script'.
-
Fixed a bug of failing to set tunnel DNS and WINs settings foe Windows Server 2003 platform.
-
Fixed a bug of failing to download CRL list when the CRL site URL is a non .com site,
for example, http://pilot.verisign.edu is failed, because it is a .edu URL not a .com URL.
Top of page
Noteworthy changes in version 9.0.1 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
-
Fixed an IPSec Client Engine (Driver) bug. The bug may cause
some multi-processors machines Blue Screen of Death (BSOD) crash while VPN tunnels are enabled. For example,
LenovoTM ThinkPad T60 and Dell InspironTM E1505.
New features in 9.0.1 release:
-
A VPN tunnel can be enabled or disabled by pressing the Enter key.
Top of page
Noteworthy changes in version 9.0.0 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release. IPSec Client 9.0.0 release is mainly for administrative reasons:
-
To synchronize with Brick/LSMS 9.x
release.
-
To have new 9.0.0 User Guide and On-line helps.
New features in 9.0.0 release:
-
Unlike all previous releases, Client 9.0.0
can be installed on Windows 2003 Server machine. However, It's
Lucent policy that IPSec Client does not support all Windows
Server platforms.
-
Functionality has been added to allow users to save and restore
tunnel configurations to and from a file. This allows the
tunnel configuration to be saved before uninstalling the IPSec Client and
restore the saved configuration after the Client has been
re-installed.
Top of page
Noteworthy changes in version 7.1.3 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
-
Fixed resources (memory and handles) leak issues.
-
Fixed the issue of the failure to add a
tunnel using CLI command "-entry add ..." for a freshly installed
IPSec Client.
-
Added CLI "-entry del | delete -name *"
to delete all tunnel configurations.
- Force Kerberos to use TCP instead of UDP
After installing the VPN Client in Windows XP and Windows 2000, if you try to log in using Kerberos,
for example, Outlook 2003, your log in may be very slow or time-out.
The problem is caused by fragmentation of large UDP Kerberos packets, especially when
operating behind PAT devices where fragmentation reassembly is not handled properly.
This bug is resolved by setting the Registry subkey during installation:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
Value Name: MaxPacketSize
Data Type: REG_DWORD
Value: 1
This forces Kerberos to always use TCP
instead of UDP.
Top of page
Noteworthy changes in version 7.1.2 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
- The CLI Command "-entry add ..." does not resolve the FQDN for TEP during configuration time as the previous versions do. For example,
for the given CLI command "LucedntIPSecClient -name test -primary cio-lra.lucent.com -entry add ...", Client will not resolve
cio-lra.lucent.com to an IP address when
it's adding the tunnel configuration.
- Conditionally release and renew DHCP lease on specific DHCP-enabled network adapters.
Top of page
Noteworthy changes in version 7.1.1 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release. If your LSMS 7.x and/or 8.x is patched for the ISAKMP Vulnerability #273756, and
IKE on Brick is not enabled, you have to install the Client 7.1.1 or above. Contact your VPN network administrator for more information.
- Banner message size is unlimited.
Previously it was 1024 bytes.
- Fixed a bug of heartbeat interval
calculation for Brick/LSMS version 8.0 or above.
- Service Pack SP4 is required for installing IPSec Client 7.x or above in Windows 2000.
Noteworthy changes in version 7.1.0 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
- AES (Advanced Encryption Standard) support. IPSec Client 7.1 now supports AES with 128-bit key,
AES with 192-bit key and AES with 256-bit key for encryption.
- Log Viewer Enhancement. Add "Refresh" and "Highlight" functions.
- Support up to 15 tunnel configurations.
- Fixed a bug in TrayIocn application that caused TrayIcon application to exit abnormally.
- Fixed a bug of LucentIKE application that cuases "Memory Access Violation" error when
DHCP lease time period was too short.
- Fixed a bug of LucentIKE application that cuases "Bind to Soket" error when
DHCP lease time period was too short.
- Fixed a bug of IPSec Engine (Driver) that hangs the machine when it performed a dial-up
connection with Windows XP QoS service enabled.
Top of page
Noteworthy changes in version 7.0.0 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the new release.
- VeriSign Digital Certificate Support. It includes end-user enrollment of VeriSign digital certificate and
VeriSign digital certificate authentication in VPN tunnel creation. Brick/LSMS 8.0 and above are required to support it.
- Microsoft CAPI Store Integration. A GUI is provided to allow end-users to browse and select a digital certificate in the Microsoft CAPI store as
long as the digital certificate is in the Local Computer store and Current User Store.
- Secure USB Tokens Authentication Support. It include Entrust Secure USB Tokens digital certificate enrollment and authentication.
SafeNet iKey 2000 USB Token is recommended.
Notes
- VeriSign digital certificate, CAPI Store
integration and USB Token supports are available for Windows 2000
and above.
Top of page
Noteworthy change for version 6.0.4 of the IPSec Client
It is recommended to uninstall all the previous IPsec Client versions before
installing the 6.0.4 release.
All versions of Lucent IPSec Client from 4.x to 6.0.3, will stop working
on 11/16/2004. This is because an internally used certificate file will
expire on 11/16/2004. The patch release version 6.0.4 will resolve the problem.
Top of page
Top of page
Hardware Requirements
- Windows 2000 Professional SP4
Processor: Pentium II 133 MHz or higher
Memory (RAM): 64 MB (min), 128 MB (recommended)
Free Hard Drive Space: 16 MB
- Windows XP Professional and Home Edition
Processor: Pentium II 300 MHz or higher.
Memory (RAM): 64 MB (min), 128 MB (recommended)
Free Hard Drive Space: 16 MB
- Windows Server 2003 Standard Edition
Processor: Pentium III 550 MHz or higher.
Memory (RAM): 128 MB of RAM required; 256 MB or more recommended
Free Hard Drive Space: 1.25 to 2 GB
Top of page
Operating System Requirements
The Lucent IPSec Client 9.2.0 package can be installed on the following Microsoft
operating systems:
- Windows 2000 Pro - SP4
- Windows XP Pro - SP2
- Windows XP Home Edition - SP2
- Windows Server 2003 - SP1
To obtain Windows service packs, please contact your administrator or visit
Microsoft
web site.
Top of page
Installation
To install the Lucent IPSec Client from a CD-ROM, insert the disc into the
CD-ROM drive of your PC to start the installation.
To install the program using a self-extracting .EXE file, double-click on the file to run it.
If a previous version of the software is installed, the installation process will detect it
and will prompt you to either uninstall the existing version or upgrade to the new version.
Notes
- Windows 2000 and Windows XP do not require a system restart after the software is
installed for the first time.
- IPSec Client Installation will detect the presence of ICS (Internet Connection Sharing).
If the ICS is detected, the Installation will show the following message
"Installation has detected the presence of ICS.
Please uninstall ICS before installing IPSec Client. Refer to README file or contact your
administrator for help.” and then quit the installation. So it is necessary to uninstall
the ICS and then install IPSec Client.
- The IPSec Client 6.0.0 and above support
ipUnplugged Mobile IP Client. However, in order to install IPSec
Client on top of ipUnplugged Mobile Client, it is required that
install the ipUnplugged Mobile Client before the IPSec Client
installation. Therefore, if a previous version of IPSec Client
installed, then the IPSec client got to be uninstalled.
Top of page
Known Issues
The following are the known issues relating to Release 9.2.0 of the IPSec
Client.
In Windows XP Dial-up connection, there is no IPSec traffic when Windows XP's built-in firewall is enabled
In Windows XP dial-up connection, there is no IPSec traffic when Windows XP's built-in firewall is enabled.
Workaround: Turn off Windows XP's built-in firewall.
How to force Kerberos to use TCP instead of UDP
The Windows Kerberos Authentication package is the default in Windows 2000 and Windows XP.
It try UDP protocol first. The limitation on the UDP packet size may result in problem.
By default, Windows 2000 and Windows XP use UDP when the data can be fit in packets
under 2,000 bytes. Any data above this value uses TCP to carry the packets.
The value of 2,000 bytes is configurable by modifying a registry key and value.
(a) Start Registry Editor.
(b) Locate and then click the following key in the registry:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
If the Parameters key does not exist, you can create it now.
On the Edit menu, click Add Value, and then add the following registry value:
Value Name: MaxPacketSize
Data Type: REG_DWORD
Value: any integer value in the range 1 to 1400 (in bytes)
(c) Quit Registry Editor.
(d) Restart your computer.
The data value to which you set this value is the maximum size to be used with UDP.
If the packet size exceeds this value, TCP is used. Again, 2,000 bytes is the default if the
value is not present.
To prevent UDP from ever being used, set the value to 1; TCP will be used for all packets.
Forcing TCP packets only is an effective workaround to this problem.
See Microsoft Knowledge Base Article.
Can not automatically update WINS settings for Dial-up connection
Under Windows 2000 or Windows XP with a Dial-Up connection, WINS settings
for the tunnel are not updated automatically upon tunnel setup.
Workaround: Update the WINS server addresses manually in the dial-up
connection properties. If you manually configure the WINS for a dial-up
connection, Microsoft requires that DNS servers should also be manually
configured. Manually configure the ISP DNS and VPN WINS server addresses in
the dial-up connection properties before establishing the dial-up connection.
Windows NT host may not be able to renew a DHCP lease
Under Windows NT, if the Firewall setting is set to "Block ALL Clear Text
Traffic", the Windows NT host may not be able to renew a DHCP lease. Renewing
the lease manually may hang the PC, and the system may need to be restarted.
IPSec Client is not Windows XP Certified
Version 7.0.0 of the IPSec Client (IPSec Driver) is not Windows XP Certified.
Under Windows XP, the driver signature message will pop up for every adapter
present on the PC. You may need to set this option to "ignore as follows:
(a) Right-click "My Computer" and select "properties"
(b) Click the "Hardware" tab
(c) Click "Driver Signing"
(d) Click the "Ignore" radio button for Driver Signing
IPsec Client
installation will prompt you to take do so.
Client is connected
to a DHCP LAN and the user has manually configured the DNS servers...
Under Windows NT, Windows 2000, or Windows XP, if the Client is connected
to a DHCP LAN and the user has manually configured the DNS servers, the VPN
DNS servers are not updated when the tunnel is configured. This prevents you
from accessing resources by name through the VPN tunnel.
Workaround: If the LAN DNS server addresses need to be manually configured,
manually configure the VPN DNS servers.
VPN DNS server settings override the LAN DNS...
Under Windows 98 or Windows ME, if the client is on a DHCP LAN while
setting up the tunnel, the VPN DNS server settings override the LAN DNS server
settings. In case of a split tunnel configuration, this prevents the user from
accessing the resources on the LAN that need name resolution.
Workaround: Manually configure the LAN DNS server addresses in the TCP/IP
properties of the corresponding adapter.
Windows XP Home Edition, Microsoft does not support logging onto the
Windows domain...
Under Windows XP Home Edition, Microsoft does not support logging onto the
Windows domain and accessing resources such as shared drives from the Windows
domain. Therefore, under Windows XP Home Edition, IPSec Client does not
support logging onto the Windows domain and accessing resources from the
Windows domain over the VPN tunnel.
Network Associates Sniffer 4.5 is not compatible with the IPsec Client
Network Associates Sniffer 4.5 is not compatible with the IPsec Client. We
do not recommend installing Sniffer 4.5 software onto any PC that has the
IPSec Client installed.
IPSec client does not gracefully bring down the tunnel
If an end user manually releases and/or renews the IP address of a PC on a
DHCP LAN, the IPSec client does not gracefully bring down the tunnel. Instead,
the server and client wait for failed heartbeat messages to bring down the
tunnel. During the period between releasing the IP addresses and timing-out on
failed/non-receipt of heartbeat messages, unexpected behavior can occur. A
future revision of the IPSec Client will gracefully bring down the tunnel
immediately following the release of the IP address. The end user will then
need to manually reestablish the tunnel.
IPSec client can not co-exist with another VPN client
IPSec client does not work if a VPN client from another vendor is
installed on the same PC.
Top of page
Event Reporting Notes
Certain Error/Notify popups now include a Reason Code (RC) to denote
additional granularity for troubleshooting purposes:
- RC1000 - RC1999 are reported by the LucentIKE service component
- RC2000 - RC2999 are reported by the gui component
- RC3000 - RC3999 are reported by the tray icon component
- RC4000 - RC4999 are reported by the driver component
RC1001 | Error occurred in creating a socket |
RC1002 | Error occurred in binding to a socket |
RC1010 | Unable to send DISABLE tunnel packet to Gateway |
RC1011 | Unable to send packet to TEP to disable tunnel |
RC1012 | Unable to send heartbeat message to Gateway |
RC1013 | Unable to send initial heartbeat message to Gateway |
RC1014 | Unable to read data from Gateway. Make sure the Gateway is running
properly |
RC1020 | Error opening a Socket in startTCP thread |
RC1021 | Bind to sock error in startTCP thread |
RC1022 | The network subsystem has failed, or no buffer space is available
while calling listen |
RC1023 | The network subsystem has failed while calling select |
RC1024 | The network subsystem has failed, or no buffer space is available
while calling accept |
RC2001 | Error occurred in creating a socket |
RC2002 | Error occurred in connecting to LucentIKE service. Make sure the
LucentIKE service is running |
RC2003 | Unable to send data to LucentIKE service, make sure it is
operating properly |
RC2010 | Gateway is not responding, make sure it is running |
RC2011 | No IP Address available in Address Pool |
RC2012 | Could not load negotiated Security Policy |
RC2013 | Invalid internal IP for local presence received from Gateway |
RC2014 | Unable to update local network configuration |
RC2015 | Enable Secure Connection failed |
RC2020 | User Authentication failed. Make sure the user credentials are correct |
Top of page
Licensing
The Lucent IPSec Client is distributed and licensed for use under the terms of the
END USER PROGRAM LICENSE AND WARRANTY AGREEMENT.
|