Compare Products

Hide

Clear All

VS

Software

RG-WALL 1600-Z-S Series Cloud-Managed Firewall Firmware(RG-WALL 1600-Z3200-S)
Type
Software
Version No.
NGFW_NTOS1.0R11
Release Time
2025-09-29
File Size
237.2MB
Version List

1 Version Information

Version Number

NGFW_NTOS1.0R11

Version Type

Official version

Applicable Product

RG-WALL 1600-Z3200-S

RG-WALL 1600-Z5100-S

Applicable Customer

Common

Release Type

Official release

Release Date

September 29, 2025

Baseline Version Number

NGFW_NTOS1.0R10

Description

Official release

2 Feature Description

2.1   NGFW_NTOS1.0R11

Feature

Source of Demand

Description

VPN

Market

l   L2TP network server (LNS)

Interconnection with Ruijie Cloud

Market

l   Device troubleshooting on Ruijie Cloud:

○      Egress bandwidth limit exceeded

○      Session limit exceeded

○      Improper IP connection limit

○      Improper IP flow control configuration

○      Line IP probe

○      Line DNS probe

l   Display of the device overview, egress traffic trend, application traffic statistics, and entries on Ruijie Cloud

l   Display of hard disk storage lifespan and read-only alarms

l   Port mapping configuration on Ruijie Cloud

l   Batch modification of device passwords, MAC address allowlists, and URL allowlists on Ruijie Cloud through the CLI

l   Threat intelligence management on Ruijie Cloud

Monitoring

Internal

Display of CLI commands delivered by Ruijie Cloud

N/A

Internal

I/O monitoring

Homepage

Market

Optimization of the dashboard on homepage

Routing

Market

OSPFv2 route filtering

DHCP

Market

Display of assigned and idle addresses in a DHCP address pool in the address management list

N/A

Market

Feedback channel for adding URL categories

Domain name object

Market

Security policy association with domain name objects

Flow control policy association with domain name objects

Usability

Market

Usability optimization:

Optimization of SSL VPN tunnel resource configuration

Optimization of port configuration and panel color

Optimization of IPsec tunnel interfaces and descriptions (hub and spoke)

Authentication

Market

Local portal page customization

Usability

Market

Optimization of the version upgrade prompt process

Usability

Market

Optimization of the password recovery guide

Address object

Market

Wildcards in address object configuration

SSL VPN

Market

Access to the device MGMT interface through the SSL VPN tunnel for device management

Security report

Market

Export of security reports

Web-based authentication

Market

Turkish support on the local portal authentication page

User tag

Market

Tag name configuration

Parent tag configuration

Tag import by using an Excel file

Tag import by importing security groups in the AD domain as tags

3 Resolved Issues

3.1   NGFW_NTOS1.0R11

Bug ID

Description

1420631, 1400806

IPv6 addresses cannot be obtained via DHCPv6 when Windows 11 or iOS systems connect to the device.

1417627

Patch components in some scenarios are incorrect.

1416075

When global IP-MAC binding is enabled and the default action is set to discarding, internal switching interfaces cannot obtain addresses via DHCP.

1415601

The search condition input on the security log page needs to be optimized. The source region, destination region, application, user, and security event information entered for query should be case-insensitive.

1413709

When *.biz is set in custom URL category configuration, it incorrectly changes to *biz for matching.

1411404

The portal authentication mechanism for iOS systems needs to be optimized.

1409658

When users click Select Node on the LDAP server editing page, the blank screen issue occasionally occurs.

1409271

Unexpected offline monitoring needs to be added to fix the issue where devices cannot reconnect to Ruijie Cloud after being disconnected for a long time.

1407775

After a power loss occurs during the upgrade process, device upgrade configuration is lost, and the device cannot be started.

1407750

The prompt of cloud server recommended version information during device self-test needs to be optimized for the scenario where recommended version information cannot be obtained.

1407456

Device traffic statistics on the Ruijie Cloud monitoring page are incorrect due to duplicate counts.

1405342

In high availability (HA) scenarios, a user logs in to the standby device through the management interface, accesses the management interface editing page, and clicks Save. In this case, the management interface is added to group 0, and the user cannot log in to the standby device through the management interface again.

1404630

System time zone information is inaccurate due to outdated time zone files.

1404541

A LAN interface is not configured with a zone, and HTTPS or SSH is enabled for access management. In this case, the system incorrectly displays an alarm indicating that the LAN interface is a WAN interface.

1401139

When the device CPU usage is high, WiFiDog v1 authentication may fail due to occasional authentication socket thread deadlock.

1399219

After a device restart, the link detection policy referenced by an interface is missing.

1391454

The transmission rate for TFTP upgrades in the boot menu needs to be enhanced.

1390941

When the system language is set to English, Chinese characters exist in session logs.

1389318

When the cache is insufficient, service lag occurs.

1388824

When both SSL VPN and IPsec VPN are enabled, traffic from IPsec VPN to SSL VPN hits flow control policies and is rate-limited, causing network issues.

1387868

A user configures resource groups for an SSL VPN gateway. When the user clicks Delete on the page, the system does not respond.

1384573

When devices are running in active/standby mode and a patch is installed on the active device, a core dump issue occurs in the HA feature of the standby device.

1383340

The system does not support the IP address format x.x.x.255.

1374720

After the antivirus function blocks file transfer via Server Message Block (SMB), the system sends the remaining files again. In this case, the device fails to create a file mapping table, and the antivirus function fails to block such virus files.

1372193

Spaces should be allowed in security policy names, and policies with spaces should be able to be deleted.

1371745

The authentication key in OSPF interface configuration should support special characters, and the MD5 authentication key should support 16 characters.

1371740

When a user views hit session details of a security policy, only the first page can be displayed.

1368729

SNMP community names (read-only, read-write), and security usernames of trap receivers should support special characters ~#%^&*+|{}:;/<>?.

1368252

Network disconnection may occur when the device forwards POP3 packets.

1368082

When a user name or corresponding user group name contains Chinese characters, the user cannot access allocated resources upon SSL VPN login.

1368022

A specific user is individually authorized to access resources through SSL VPN. If the user logs in using a username with a domain name, the user cannot access allocated resources as expected. For example, if resource1 is allocated to user1, the user can access resource1 upon login using the username user1, but cannot access it using the username user1@domain.

1407560

Network File System (NFS) packet parsing errors cause memory allocation overflow and device traffic interruption.

1425691

The application analysis information reported by the device to Ruijie Cloud contains application names in Chinese.

1436469

The number of online IP addresses displayed on the homepage of the device web UI does not match the number of users displayed on Ruijie Cloud.

1456235

After the real-time session function is enabled, the real-time traffic statistics graph is discontinuous, with missing data points.

1455700

When intelligent routing is used to forward ALG-related traffic (such as in PPTP/FTP active mode), the routing directions for control sessions and data sessions are inconsistent. As a result, intelligent routing sets different outbound interfaces for bidirectional data session flows.

1455594

eMMC over-write alarms need to be masked in system logs to avoid customer confusion.

1454990

In specific situations, the CPU usage on the homepage of the device web UI does not update.

1454047

In the multi-egress scenario, after the system processes ALG-related traffic, the memory of the processing node is not released, causing a memory leak.

1453258

In some scenarios, when NGFW_NTOS1.0R10P2 with the IPsec configuration is upgraded to NGFW_NTOS1.0R11, the IPsec configuration fails to be reloaded. As a result, the IPsec VPN tunnel fails to be established.

1453251

If SSL proxy is enabled, the hardware encryption module of the system outputs a large number of logs in heavy-traffic scenarios, causing data plane congestion. As a result, the GC thread proactively triggers a core dump, and the CPU usage on the management plane is high.

1451607

When the version name format is incorrect (for example, with parentheses), the upgrade fails.

1450465

The device in transparent bridge mode cannot forward double-tagged VLAN packets.

1448803

If the ports for services such as the web, SSH, and SSL VPN services in earlier versions are in the range of 20100 to 32767, the related services become unavailable after the device is upgraded to NGFW_NTOS1.0R11.

1448379

An RG-NSEC-4GE4SFP or RG-NSEC-4GE4SFP V2 expansion module is installed on the device, and a copper transceiver is inserted into the module. In this case, the port fails to go Up after the device is powered on and started.

Ruijie Networks websites use cookies to deliver and improve the website experience.

See our cookie policy for further details on how we use cookies and how to change your cookie settings.

Cookie Manager

When you visit any website, the website will store or retrieve the information on your browser. This process is mostly in the form of cookies. Such information may involve your personal information, preferences or equipment, and is mainly used to enable the website to provide services in accordance with your expectations. Such information usually does not directly identify your personal information, but it can provide you with a more personalized network experience. We fully respect your privacy, so you can choose not to allow certain types of cookies. You only need to click on the names of different cookie categories to learn more and change the default settings. However, blocking certain types of cookies may affect your website experience and the services we can provide you.

  • Performance cookies

    Through this type of cookie, we can count website visits and traffic sources in order to evaluate and improve the performance of our website. This type of cookie can also help us understand the popularity of the page and the activity of visitors on the site. All information collected by such cookies will be aggregated to ensure the anonymity of the information. If you do not allow such cookies, we will have no way of knowing when you visited our website, and we will not be able to monitor website performance.

  • Essential cookies

    This type of cookie is necessary for the normal operation of the website and cannot be turned off in our system. Usually, they are only set for the actions you do, which are equivalent to service requests, such as setting your privacy preferences, logging in, or filling out forms. You can set your browser to block or remind you of such cookies, but certain functions of the website will not be available. Such cookies do not store any personally identifiable information.

Accept All

View Cookie Policy Details

Contact Us

Contact Us

How can we help you?

Contact Us

Get an Order help

Contact Us

Get a tech support