Compare Products
Hide
VS
|
Version Number |
NGFW_NTOS1.0R11 |
|
Version Type |
Official version |
|
Applicable Product |
RG-WALL 1600-Z3200-S RG-WALL 1600-Z5100-S |
|
Applicable Customer |
Common |
|
Release Type |
Official release |
|
Release Date |
September 29, 2025 |
|
Baseline Version Number |
NGFW_NTOS1.0R10 |
|
Description |
Official release |
|
Feature |
Source of Demand |
Description |
|
VPN |
Market |
l L2TP network server (LNS) |
|
Interconnection with Ruijie Cloud |
Market |
l Device troubleshooting on Ruijie Cloud: ○ Egress bandwidth limit exceeded ○ Session limit exceeded ○ Improper IP connection limit ○ Improper IP flow control configuration ○ Line IP probe ○ Line DNS probe l Display of the device overview, egress traffic trend, application traffic statistics, and entries on Ruijie Cloud l Display of hard disk storage lifespan and read-only alarms l Port mapping configuration on Ruijie Cloud l Batch modification of device passwords, MAC address allowlists, and URL allowlists on Ruijie Cloud through the CLI l Threat intelligence management on Ruijie Cloud |
|
Monitoring |
Internal |
Display of CLI commands delivered by Ruijie Cloud |
|
N/A |
Internal |
I/O monitoring |
|
Homepage |
Market |
Optimization of the dashboard on homepage |
|
Routing |
Market |
OSPFv2 route filtering |
|
DHCP |
Market |
Display of assigned and idle addresses in a DHCP address pool in the address management list |
|
N/A |
Market |
Feedback channel for adding URL categories |
|
Domain name object |
Market |
Security policy association with domain name objects Flow control policy association with domain name objects |
|
Usability |
Market |
Usability optimization: Optimization of SSL VPN tunnel resource configuration Optimization of port configuration and panel color Optimization of IPsec tunnel interfaces and descriptions (hub and spoke) |
|
Authentication |
Market |
Local portal page customization |
|
Usability |
Market |
Optimization of the version upgrade prompt process |
|
Usability |
Market |
Optimization of the password recovery guide |
|
Address object |
Market |
Wildcards in address object configuration |
|
SSL VPN |
Market |
Access to the device MGMT interface through the SSL VPN tunnel for device management |
|
Security report |
Market |
Export of security reports |
|
Web-based authentication |
Market |
Turkish support on the local portal authentication page |
|
User tag |
Market |
Tag name configuration Parent tag configuration Tag import by using an Excel file Tag import by importing security groups in the AD domain as tags |
|
Bug ID |
Description |
|
1420631, 1400806 |
IPv6 addresses cannot be obtained via DHCPv6 when Windows 11 or iOS systems connect to the device. |
|
1417627 |
Patch components in some scenarios are incorrect. |
|
1416075 |
When global IP-MAC binding is enabled and the default action is set to discarding, internal switching interfaces cannot obtain addresses via DHCP. |
|
1415601 |
The search condition input on the security log page needs to be optimized. The source region, destination region, application, user, and security event information entered for query should be case-insensitive. |
|
1413709 |
When *.biz is set in custom URL category configuration, it incorrectly changes to *biz for matching. |
|
1411404 |
The portal authentication mechanism for iOS systems needs to be optimized. |
|
1409658 |
When users click Select Node on the LDAP server editing page, the blank screen issue occasionally occurs. |
|
1409271 |
Unexpected offline monitoring needs to be added to fix the issue where devices cannot reconnect to Ruijie Cloud after being disconnected for a long time. |
|
1407775 |
After a power loss occurs during the upgrade process, device upgrade configuration is lost, and the device cannot be started. |
|
1407750 |
The prompt of cloud server recommended version information during device self-test needs to be optimized for the scenario where recommended version information cannot be obtained. |
|
1407456 |
Device traffic statistics on the Ruijie Cloud monitoring page are incorrect due to duplicate counts. |
|
1405342 |
In high availability (HA) scenarios, a user logs in to the standby device through the management interface, accesses the management interface editing page, and clicks Save. In this case, the management interface is added to group 0, and the user cannot log in to the standby device through the management interface again. |
|
1404630 |
System time zone information is inaccurate due to outdated time zone files. |
|
1404541 |
A LAN interface is not configured with a zone, and HTTPS or SSH is enabled for access management. In this case, the system incorrectly displays an alarm indicating that the LAN interface is a WAN interface. |
|
1401139 |
When the device CPU usage is high, WiFiDog v1 authentication may fail due to occasional authentication socket thread deadlock. |
|
1399219 |
After a device restart, the link detection policy referenced by an interface is missing. |
|
1391454 |
The transmission rate for TFTP upgrades in the boot menu needs to be enhanced. |
|
1390941 |
When the system language is set to English, Chinese characters exist in session logs. |
|
1389318 |
When the cache is insufficient, service lag occurs. |
|
1388824 |
When both SSL VPN and IPsec VPN are enabled, traffic from IPsec VPN to SSL VPN hits flow control policies and is rate-limited, causing network issues. |
|
1387868 |
A user configures resource groups for an SSL VPN gateway. When the user clicks Delete on the page, the system does not respond. |
|
1384573 |
When devices are running in active/standby mode and a patch is installed on the active device, a core dump issue occurs in the HA feature of the standby device. |
|
1383340 |
The system does not support the IP address format x.x.x.255. |
|
1374720 |
After the antivirus function blocks file transfer via Server Message Block (SMB), the system sends the remaining files again. In this case, the device fails to create a file mapping table, and the antivirus function fails to block such virus files. |
|
1372193 |
Spaces should be allowed in security policy names, and policies with spaces should be able to be deleted. |
|
1371745 |
The authentication key in OSPF interface configuration should support special characters, and the MD5 authentication key should support 16 characters. |
|
1371740 |
When a user views hit session details of a security policy, only the first page can be displayed. |
|
1368729 |
SNMP community names (read-only, read-write), and security usernames of trap receivers should support special characters ~#%^&*+|{}:;/<>?. |
|
1368252 |
Network disconnection may occur when the device forwards POP3 packets. |
|
1368082 |
When a user name or corresponding user group name contains Chinese characters, the user cannot access allocated resources upon SSL VPN login. |
|
1368022 |
A specific user is individually authorized to access resources through SSL VPN. If the user logs in using a username with a domain name, the user cannot access allocated resources as expected. For example, if resource1 is allocated to user1, the user can access resource1 upon login using the username user1, but cannot access it using the username user1@domain. |
|
1407560 |
Network File System (NFS) packet parsing errors cause memory allocation overflow and device traffic interruption. |
|
1425691 |
The application analysis information reported by the device to Ruijie Cloud contains application names in Chinese. |
|
1436469 |
The number of online IP addresses displayed on the homepage of the device web UI does not match the number of users displayed on Ruijie Cloud. |
|
1456235 |
After the real-time session function is enabled, the real-time traffic statistics graph is discontinuous, with missing data points. |
|
1455700 |
When intelligent routing is used to forward ALG-related traffic (such as in PPTP/FTP active mode), the routing directions for control sessions and data sessions are inconsistent. As a result, intelligent routing sets different outbound interfaces for bidirectional data session flows. |
|
1455594 |
eMMC over-write alarms need to be masked in system logs to avoid customer confusion. |
|
1454990 |
In specific situations, the CPU usage on the homepage of the device web UI does not update. |
|
1454047 |
In the multi-egress scenario, after the system processes ALG-related traffic, the memory of the processing node is not released, causing a memory leak. |
|
1453258 |
In some scenarios, when NGFW_NTOS1.0R10P2 with the IPsec configuration is upgraded to NGFW_NTOS1.0R11, the IPsec configuration fails to be reloaded. As a result, the IPsec VPN tunnel fails to be established. |
|
1453251 |
If SSL proxy is enabled, the hardware encryption module of the system outputs a large number of logs in heavy-traffic scenarios, causing data plane congestion. As a result, the GC thread proactively triggers a core dump, and the CPU usage on the management plane is high. |
|
1451607 |
When the version name format is incorrect (for example, with parentheses), the upgrade fails. |
|
1450465 |
The device in transparent bridge mode cannot forward double-tagged VLAN packets. |
|
1448803 |
If the ports for services such as the web, SSH, and SSL VPN services in earlier versions are in the range of 20100 to 32767, the related services become unavailable after the device is upgraded to NGFW_NTOS1.0R11. |
|
1448379 |
An RG-NSEC-4GE4SFP or RG-NSEC-4GE4SFP V2 expansion module is installed on the device, and a copper transceiver is inserted into the module. In this case, the port fails to go Up after the device is powered on and started. |
Ruijie Networks websites use cookies to deliver and improve the website experience.
See our cookie policy for further details on how we use cookies and how to change your cookie settings.
Cookie Manager
When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.
Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.
This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.
Contact Us
How can we help you?