Compare Products
Hide
VS
|
Version Number |
NGFW_NTOS1.0R13 |
|
Version Type |
Official version |
|
Applicable Product |
RG-WALL 1600-Z3200-S RG-WALL 1600-Z5100-S |
|
Applicable Customer |
Common |
|
Release Type |
Official release |
|
Release Date |
April 28, 2026 |
|
Baseline Version Number |
NGFW_NTOS1.0R12 |
|
Description |
Official release |
|
Feature |
Source of Demand |
Description |
|
Compliance requirements |
Market |
Data compliance optimization: 1. Optimization and update of the privacy agreement content 2. Optimization of the logic for login agreement check operation to improve user experience and compliance |
|
Cloud deployment module |
Internal |
Adding event tracking collection capability: 1. Adding the event tracking collection function for page behaviors 2. Adding the description of event tracking to the user experience improvement program |
|
DHCP server |
Market |
Viewing IP allocation logs on web UIs |
|
Quick Onboarding and System Upgrade pages |
Internal |
Improving user experiences for version upgrade: 1. Adding the description of the number of upgradable versions on the version discovery page 2. Adding the version upgrade guide on the Quick Onboarding page, supporting fast discovery and download of new versions 3. Configuring one-time scheduled upgrade and restart |
|
IPsec VPN |
Internal |
Optimizing the IPsec VPN throughput IPsec VPN reliability: 1. Multi-link active/standby failover and auto fallback for branches 2. Connecting branches to multiple headquarters, realizing headquarters backup and switchover |
|
SSL VPN |
Internal |
Flexible MTU configuration on the SSL VPN device side |
|
IPS |
Market |
l Redirection from the device-side IPS log page to the IPS knowledge base is supported for viewing details. l Improved IPS detection capability: ○ The detection depth of the application layer is enhanced, and the single-packet detection depth is increased to 6k. ○ Signature capacity expanded to 30,000 l Improving comprehensive threat protection performance: ○ Device throughput performance optimized for IPS + application identification scenarios |
|
Multi-egress load balancing |
Internal |
The source address load balancing algorithm is optimized to improve load balancing performance in scenarios with small number of endpoints and sessions. |
|
User authentication |
Market |
SSO supports local domain name configuration. |
|
Web authentication |
Market |
Local Portal supports the built-in Indonesian language pack. In HA scenarios, SSO authenticated users can be synchronized to the standby device. |
|
Behavior analysis |
Market |
The behavior analysis function is optimized for the international version and is available only for authorized customers. |
|
SSH service |
Internal |
Managing devices through SSH connections based on IPv6 addresses |
|
Local protection |
Internal |
Optimized local protection, supporting interface access control configuration for IPv6-based device management |
|
Interface |
Internal |
The independent management interface and bridge interface support IPv6 address configuration, realizing IPv6-based device management. WAN interfaces support secondary IP address configuration, meeting the requirements of multi-egress line scenarios. |
|
Packet obtaining tools |
Internal |
Packet obtaining tool optimization: 1. Packet Obtaining Option supports distinguishing between IPv4 and IPv6 protocols. 2. A single packet obtaining file supports a maximum of 50 MB. 3. Simultaneous packet obtaining on the physical interface and its sub-interfaces. 4. Simultaneous packet obtaining on internal and external network interfaces. |
|
SSL proxy |
Market |
Usability optimization for SSL proxy: SSL proxy templates are removed to simplify the configuration process. |
|
Flow platform |
Market |
New session capacity and establishment rate are optimized, and basic forwarding performance under high-load scenarios are improved. |
|
VRRP |
Internal |
VRRP function optimization: 1. The number of monitored interfaces per VRRP group is expanded from 1 to 8. 2. VRRP-Track linkage is supported, with each VRRP group associated with up to 8 link detection policies. |
|
Report |
Market |
1. Security report generation is supported, covering content including overview, threat intelligence, attack source/destination analysis, high-bandwidth application traffic, DDoS protection analysis, and encrypted traffic detection. 2. Traffic report generation is supported, covering content including traffic statistics of applications, lines, users, and source IPs, as well as statistics of online users and user session counts. 3. Email-based report delivery. |
|
URL filtering |
Market |
The HTTP secure search function is added, which supports secure search of Google, Bing, Yandex, Yahoo, and YouTube. |
|
DNS security |
Market |
The DNS secure search function is added, which supports secure search for Google, Bing, YouTube, and other services. |
|
Link detection |
Market |
IPv6 link detection is supported, enhancing the monitoring capability for IPv6 network environments. |
|
Threat intelligence |
Market |
Adding international threat intelligence capabilities: 1. Google threat intelligence sources 2. Enabling multi-source intelligence detection |
|
Bug ID |
Description |
|
After URL filtering is configured or behavior analysis is enabled, there is a probability that memory overwriting occurs under high QUIC traffic, resulting in system coredump. |
|
|
In the IPsec VPN headquarters-branch scenario, if the peer device cannot process SA lifetime advertisement messages, the SA lifetime is inconsistent between the two ends, and the lifetime is longer at the branch end, frequent IPsec service interruptions occur. |
|
|
In the IPsec VPN HQ-branch scenario, when message 3 of the second phase of IKE negotiation is lost, the tunnel status on the branch is displayed as established while the tunnel status on the HQ is displayed as not established. |
|
|
In the IPsec VPN HQ-branch scenario, the peer end uses a domain name to establish a tunnel with the local end. The tunnel occasionally fails to be established if the domain name of the peer end changes. |
|
|
In HA scenarios, imported and approved hardware signatures on the primary device are marked as unapproved on the secondary device after synchronization. |
|
|
In the IPsec VPN HQ-branch scenario, if IKEv1 aggressive mode is configured on the branch device, message 3 is not standard, causing phase 2 negotiation failure and tunnel establishment failure. |
|
|
After a security policy is renamed and moved, traffic cannot be normally matched by the policy. |
|
|
After static IP addresses of all interfaces on the device are deleted, the static IP addresses configured for the switch interface, aggregate interface, and sub-interface cannot be saved. |
|
|
In PPPoE multi-WAN scenarios, clients fail to log in to SSL VPN using a domain name, while login via IP address works properly. |
|
|
1562766 |
After the quick onboarding configuration is completed, the area to which the WAN-type interface and LAN-type interface belong is incorrect. |
|
1589768 |
In LAN scenarios, bandwidth configuration has no practical effect, while the web interface still provides bandwidth configuration options for LAN ports. |
|
1587905 |
In the factory default state, port 0 (preconfigured with a DHCP server) cannot be switched to transparent mode during quick onboarding configuration. |
|
1585607 |
An IP address must be configured for a bridge interface to which an interface in transparent mode is automatically added in the quick onboarding wizard. The logic for verifying IP address conflicts is incorrect. |
|
1589031 |
When the allowlist or blocklist entries contain spaces in their descriptions, the exported CSV file cannot be imported into the device. |
|
1588145 |
In an SSL VPN scenario, when the client submits an empty hardware signature, the device incorrectly creates an empty entry that cannot be deleted. |
|
1586026 |
When a physical interface is not in routing mode, the system incorrectly reports an alarm message indicating that the interface outside the trust zone can access the device through the web. |
|
1582267 |
Due to inconsistent time between the PC and the device, no session data is displayed when a user clicks to view sessions in a security policy. |
|
1576703 |
In a multi-peer IPsec VPN scenario, after peer switching, the previous negotiation state is not cleared in time, resulting in the coexistence of two negotiation states. |
|
1590666 |
Hourly attack trend statistics updates are abnormal when the statistics collection period is set to one day. |
|
1593065 |
Due to optimization of the flow platform process in other modules without considering the impact on GRE tunnels, packet flow direction verification errors occurred in GRE over IPsec scenarios. After Keepalive was enabled on the GRE interface, the interface status changed to Down. |
This version is for customers only.
If you are not using this software in , to avoid being unable to use it after upgrading, we recommend that you select another version.
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?