cOS Core 15.00.02 Release Notes


Table of Contents

1. Version Summary
2. New Features
2.1. New Features and Enhancements in cOS Core 15.00.02
2.2. New Features and Enhancements in cOS Core 15.00.01
2.3. New Features and Enhancements in cOS Core 15.00.00
3. Addressed Issues
3.1. Addressed Issues in cOS Core 15.00.02
3.2. Addressed Issues in cOS Core 15.00.01
3.3. Addressed Issues in cOS Core 15.00.00
4. Installation Instructions
4.1. Upgrade Considerations
4.2. Upgrading From a cOS Core 12.nn, 13.nn or 14.nn System
5. Known Limitations
6. Compatibility
7. Licensing
8. Getting Help

Chapter 1: Version Summary

[Note] Note: This document is also available in PDF format

A PDF version of this guide can be found in the document file list for each cOS Core release at https://my.clavister.com.

Clavister cOS Core 15.00.02 is the latest version of our award-winning network security operating system powering the Clavister NetWall, our premium NGFW security solution.

For a list of appliances that are supported by this version of Clavister cOS Core, please refer to the Compatibility section.

[Important] Important
If you are using InControl for centralized management please note that cOS Core 15.00.02 requires InControl version 3.19.01 or later. We recommend always using the latest version.
[Important] Important
Clavister cOS Core 15.00.02 requires a Clavister subscription covering May 1, 2025. Make sure that this is covered before trying to upgrade the system, otherwise the system will enter a "License Lockdown" mode.

Chapter 2: New Features

The following sections detail new features and enhancements in Clavister cOS Core 15.00.02. For a complete list and description of all the features in Clavister cOS Core 15.00.02, refer to Clavister cOS Core Administration Guide 15.00.02.

2.1. New Features and Enhancements in cOS Core 15.00.02

  • Support for GRE L2
    Support for GRE L2 (Generic Routing Encapsulation at Layer 2) tunnels has been added. GRE L2, also known as GRETAP or L2GRE, enables encapsulation of full Ethernet frames, including the original Ethernet header, allowing for the transparent transport of Layer 2 traffic between two Clavister NetWall devices.

    Note: GRE L2 tunnels are not encrypted or authenticated by default. For secure transport, it is recommended to combine GRE L2 with IPsec.

  • OneConnect Certificates
    It is now possible to configure a certificate per OneConnect interface, instead of using one global certificate for all OneConnect interfaces. By default, new and existing OneConnect interfaces use the management web user interface certificate.

  • Updated Timeout for Subscription-Based Licenses
    Subscription based licenses were earlier limited to only run for 2 weeks without update check. This limit has been removed and now the reduced mode is delayed until subscription end is reached.

  • OpenID Connect (OIDC) User Groups
    OIDC has been updated and can now handle up to 199 groups. If a user belongs to more than 199 groups, Microsoft Entra will not send any group belongings. See the KB space (https://kb.clavister.com) for instructions of how this scenario can be handled.

  • RADIUS Server
    The integrated RADIUS server allows Clavister NetWall appliances to provide authentication services for devices using EAP-TLS in 802.1X deployments. It is designed specifically for device-based authentication and does not support user authentication. This enables the firewall to function as a RADIUS server for network access control in environments where certificate-based authentication is used to validate devices.

  • SNMPv3 Privacy Passphrase
    It is now possible to configure separate passwords for SNMPv3 Authentication and SNMPv3 Privacy. The new setting is optional and is configured on the user in the local user database. If the privacy passphrase is not set, the normal password will be used both for authentication and privacy like in older versions.

  • Improved Memory Tracking
    The internal memory reporting system has been improved for better subsystem memory tracking. The result in the "memory" CLI command will be more accurate after this change.

  • New Advanced Setting for SNMP
    It is now possible to use the device name (configured under Device Settings, shown at the top of the web user interface dashboard and used as CLI prompt) as SNMP System Name, instead of specifying an additional name only used for SNMP. Firewalls upgraded will continue to use the same SNMP System Name in the configuration as in older versions while new installations have the new setting enabled to use the global device name. The new setting can be found under Remote Management -> Advanced Settings.

  • Default Private IP Address for VLAN Interfaces
    New VLAN Interfaces will have the default value for Private HA IPv4 Address set to "localhost".

  • Updated Backup Filenames
    The default filenames for configuration backups, anonymous configuration backups and full system backups, when downloading from the web user interface, have been updated to include firmware version. The technical support file name, also when downloaded from the web user interface, has been aligned with the backup files and also includes HA member role if part of an HA cluster.

  • IPv6 Support for the REST API
    The REST API now also supports using IPv6 addresses.

  • Updated GeoIP and Ethernet Vendor Databases
    The GeoIP and Ethernet vendor databases have been updated to the latest releases.

  • New Application Control Library
    The Application Library has been updated to version 1.770.1. New protocols include:

    • Tunneling

      • AirVPN (airvpn)

    • Security Service

      • Fortinet (fortinet)

    • Thin Client

      • Microsoft Quick Assist (ms_quick_assist)

    • Database

      • Pinecone (pinecone)

    • Audio/Video

      • Rakuten Music (rakuten_music)

    • Instant Messaging

      • Element (element)
      • Matrix (matrix)
      • Zangi Private Messenger (zangi)

    • Web

      • 7-Zip (7zip)
      • ACLU (aclu)
      • AbeBooks (abebooks)
      • Accessify (accessify)
      • Association for Computing Machinery (acm)
      • Audacity (audacity)
      • Automattic (automattic)
      • Axios (axios)
      • B and H Photo Video (bhphoto)
      • Barnes & Noble (barnesandnoble)
      • BitcoinTalk (bitcointalk)
      • Blackbaud (blackbaud)
      • Blockchain.com (blockchain_com)
      • Bol.com (bol)
      • Buffer (buffer)
      • Business Wire (businesswire)
      • Buy Me a Coffee (buymeacoffee)
      • Buzzsprout (buzzsprout)
      • CSS-Tricks (css_tricks)
      • Calendly (calendly)
      • Cancer Research UK (cancer_research_uk)
      • Capterra (capterra)
      • Check Point (checkpoint)
      • China Government (gov_cn)
      • Cnblogs (cnblogs)
      • CodeProject (codeproject)
      • Coinbase (coinbase)
      • Columbia University (columbia_university)
      • Commission Junction (commission_junction)
      • Cornell University (cornell_university)
      • DEV Community (dev_to)
      • Dainik Bhaskar (bhaskar)
      • DeepL (deepl)
      • Deutsche Welle (deutsche_welle)
      • Digital Object Identifier (doi)
      • Diigo (diigo)
      • Eastday (eastday)
      • Eclipse (eclipse)
      • Electronic Frontier Foundation (eff)
      • European Space Agency (esa)
      • FBI (fbi)
      • Federation of American Scientists (fas_org)
      • Feedspot (feedspot)
      • FileZilla (filezilla)
      • GIMP (gimp)
      • GNU (gnu)
      • Geek.com (geek)
      • Gitter (gitter)
      • Greenpeace (greenpeace)
      • Gumroad (gumroad)
      • Harvard University (harvard)
      • Heise Online (heise_online)
      • Hong Kong Rope Skipping Academy (hkrsa)
      • HostGator (hostgator)
      • Humble Bundle (humblebundle)
      • Hupu (hupu)
      • Hushmail (hushmail)
      • IFTTT (ifttt)
      • IGN (ign)
      • Inkscape (inkscape)
      • Internal Revenue Service (irs_gov)
      • Internet Engineering Task Force (ietf)
      • Itchy Feet on the Cheap (itchyfeetonthecheap)
      • JAMA Network (jamanetwork)
      • JetBrains (jetbrains)
      • JuicyAds (juicyads)
      • Ko-fi (kofi)
      • Kraken (kraken)
      • LG (lg)
      • Launchpad (launchpad)
      • Library of Congress (loc_gov)
      • Life360 (life360)
      • Linktree (linktree)
      • Literotica (literotica)
      • Louvre (louvre)
      • Lowe's (lowes)
      • Lucid (lucid)
      • Lulu (lulu_com)
      • Marine Traffic (marine_traffic)
      • Mathrubhumi (mathrubhumi)
      • National Endowment for the Humanities (neh_gov)
      • NetBeans (netbeans)
      • Node.js (nodejs)
      • OBS Studio (obsproject)
      • ORCID (orcid)
      • Oprah.com (oprah_com)
      • Otto (otto)
      • PCWorld (pcworld)
      • PHP (php)
      • PLOS (plos)
      • Pixlr (pixlr)
      • Planview (planview)
      • Pocket (pocket)
      • Podbean (podbean)
      • Presseportal (presseportal)
      • ProBlogger (problogger)
      • Psychology Today (psychologytoday)
      • Public Broadcasting Service (pbs)
      • Python (python)
      • Rakuten Pay (rakuten_pay)
      • Rakuten Travel (rakuten_travel)
      • Ranker (ranker)
      • Reacts (reacts)
      • Rebrandly (rebrandly)
      • Red Bull (redbull)
      • Red Hat (redhat)
      • Redbubble (redbubble)
      • Sage Publications (sagepub)
      • Search Engine Roundtable (seroundtable)
      • ShareASale (shareasale)
      • ShareThis (sharethis)
      • SiteGround (siteground)
      • Siteimprove (siteimprove)
      • Sketchfab (sketchfab)
      • Skillshare (skillshare)
      • Skimlinks (skimlinks)
      • Smashing Magazine (smashingmagazine)
      • Smashwords (smashwords)
      • Springer (springer)
      • Sprout Social (sproutsocial)
      • Sublime Text (sublimetext)
      • Sutter Health (sutterhealth)
      • Synology (synology)
      • T.LY (tly)
      • The Hill (thehill)
      • The Sun (thesun)
      • The Verge (theverge)
      • Thumbtack (thumbtack)
      • Trustpilot (trustpilot)
      • U.S. Department of the Treasury (treasury_gov)
      • UNESCO (unesco)
      • Udacity (udacity)
      • United Nations (united_nations)
      • United Press (united_press)
      • University College London (uclondon)
      • University of Colorado (colorado_edu)
      • University of Hawaii (hawaii_edu)
      • Wattpad (wattpad)
      • Weather Underground (wunderground)
      • Wiley (wiley)
      • World Economic Forum (weforum)
      • Wowhead (wowhead)
      • YooMoney (yoomoney)
      • Ze Delivery (ze_delivery)
      • edX (edx)
      • is.gd (is_gd)
      • wikiHow (wikihow)
      • xkcd (xkcd)

2.2. New Features and Enhancements in cOS Core 15.00.01

  • Usernames for OpenID Connect and Microsoft Entra
    It is now possible to specify which OpenID Connect parameter, instead of the default one, to use for populating username when OIDC is used as Authentication method. This makes it possible to get usernames in plain text instead of the GUID that Microsoft Entra otherwise sends.

  • New Version of the AI Library
    The AI library has been updated to version 1.2.0.

  • OpenID Connect (OIDC)
    A timer has been added to regularly keep the OIDC data up to date. The refresh interval is a user setting with a default of one hour.

  • Upload Progress Bar in the Web User Interface
    The Web User Interface will now display a progress bar showing file upload progress when uploading Upgrade files and Full Backup files.

  • Certificate Chains in Reverse Proxy
    Added support for configuration of certificate chains in the reverse proxy maps.

  • Ping CLI Command Improvement
    The "ping" CLI command has been updated to check for both IPv4 and IPv6 but put priority on IPv4 if both are resolved. To ping using a specific IP-version use "ping -4" or "ping -6".

  • Temporary Blacklist of IPs from the Web User Interface
    It is now possible to temporarily blacklist IP addresses from the Blacklist Status page in the web user interface. IPs will be blocked for 24 hours. For more detailed manual blacklisting, we recommend using the REST API.

  • Legacy Interface Drivers
    Support for legacy interface drivers has been removed from the 32-bit version of cOS Core.

  • Updated Timezone Database
    The timezone database has been updated to the latest version.

  • Shutdown CLI Command
    The CLI command "shutdown" has been updated to do a full reboot as the default behavior on 100, 200R, 300, 500, 6000 Series and 64bit virtual installations. The flags "-reboot" and "-restart" are available on all platforms.

  • Extended Error Logging for RADIUS
    The RADIUS client has been extended to include reason why "radius_parse_error" was triggered making it easier to determine where the problem is.

  • Updated GeoIP and Ethernet Vendor Databases
    The GeoIP and Ethernet vendor databases have been updated to the latest releases.

  • New Application Control Library
    The Application Library has been updated to version 1.760.1. New protocols include:

    • Game

      • Mir Tankov (mir_tankov)

    • Network Service

      • Multiple VLAN Registration Protocol (mvrp)

    • Application Service

      • Wolfram MathLM (mathlm)

    • Tunneling

      • Chisel (chisel)
      • Urban VPN (urban_vpn)

    • Middleware

      • Imonnit (imonnit)
      • LabX (labx)

    • Audio/Video

      • Claro Video (claro_video)
      • Comcast CDN (comcast_cdn)
      • SkyShowtime (skyshowtime)
      • Xumo (xumo)

    • Web

      • 33Across (33across)
      • Algolia (algolia)
      • Ancestry (ancestry)
      • ArXiv (arxiv)
      • ASOS (asos)
      • Baidu YiYan (baidu_yiyan)
      • Best Buy (best_buy)
      • Centers for Disease Control and Prevention (cdc_gov)
      • Creative Commons (creativecommons)
      • Cvent (cvent)
      • Dell (dell)
      • Digitaleo (digitaleo)
      • DigitalOcean (digitalocean)
      • Dribbble (dribbble)
      • U.S. Food and Drug Administration (fda_gov)
      • Fidelity Investments (fidelity_investments)
      • The Financial Times (financial_times)
      • Forbes (forbes)
      • Federal Trade Commission (ftc_gov)
      • Gap (gap)
      • Gartner (gartner)
      • GoFundMe (gofundme)
      • Google Assistant (google_assistant)
      • HDFC Bank (hdfc)
      • Inspectlet (inspectlet)
      • Autodesk Instructables (instructables)
      • kohls (kohls)
      • Los Angeles Times (latimes)
      • Live365 (live365_radio)
      • Lucidchart (lucidchart)
      • Lyft (lyft)
      • muse.ai (muse_ai)
      • Naukri (naukri)
      • NetSuite (netsuite)
      • The New Yorker (newyorker)
      • National Institutes of Health (nih_gov)
      • npm (npm)
      • New York Post (nypost)
      • Onde (onde_app)
      • Pixabay (pixabay)
      • Politico (politico)
      • Quizlet (quizlet)
      • ScienceDirect (sciencedirect)
      • Statista (statista)
      • Stile (stile)
      • South by Southwest (sxsw)
      • TaxiF (taxif)
      • TechCrunch (techcrunch)
      • The Atlantic (theatlantic)
      • The Globe and Mail (theglobeandmail)
      • The Guardian (theguardian)
      • Ticketmaster (ticketmaster)
      • TinyURL (tinyurl)
      • TripIt (tripit)
      • Twinkl (twinkl)
      • UEFA (uefa)
      • Unsplash (unsplash)
      • United Parcel Service (ups_shipping)
      • Variety (variety)
      • Vice (vice)
      • World Health Organization (world_health_org)
      • Zerodha (zerodha)
      • Zillow (zillow)
      • Zomato (zomato)
      • Zscaler (zscaler)

2.3. New Features and Enhancements in cOS Core 15.00.00

  • AI Policies
    Using Artificial Intelligence (AI) to perform Anomaly Detection, in a broad sense, is the identification of patterns that do not conform to a defined normal behavior. In cOS Core, the Anomaly Detection feature employs a combination of state-of-the-art concepts in machine learning and time-series analysis to detect communication misbehavior in near real-time. The underlying technique features a multi-layer AI engine that enables the creation and configuration of multiple AI models that monitor multiple data streams concurrently. AI Policies are available on the 200R Series, 300 Series, 500 Series and 6000 Series. To configure AI Policies a license is required.

  • IPv6 Support for PPPoE Interfaces
    PPPoE (Point-to-Point Protocol over Ethernet) interfaces now fully support IPv6, ensuring compatibility with ISPs and services that rely on IPv6 addressing.

  • IP Rules, ALGs and SSL VPN Interfaces
    Older types of objects like IP Rules, ALGs and SSL VPN Interfaces are no-longer possible to add. Existing objects of these types can still be edited or deleted. Replacements are IP Policies, Profiles and One Connect.

  • User Groups
    Configuration of user authentication related to IP Policies has been updated. Instead of configuring user authentication on the address object, a new User Group object has been introduced. This new object can be used as a filter directly on an IP Policy.

    During upgrade a conversion to the new format will be done. Nested objects are not possible to convert automatically.

    IP Policies, IP Rules, Threshold Rules, IDP Rules and Routing Rules referring to network objects that could not be converted will be disabled after the upgrade, to let the administrator verify them before manually activating them again.

    Review the configuration log after the upgrade, any object that was not converted will be listed here. Disabled objects will also be logged in the console CLI during the first start up of the new version.

  • Prefix Delegation for DHCPv6
    Support has been added for IPv6 Prefix Delegation. An external interface, for example the interface facing the ISP, can be set in DHCPv6 Client mode and internal interfaces can after that delegate a subnet of the received prefix.

  • DHCP Client for High Availability
    Interfaces in a High Availability (HA) cluster can now use DHCP to obtain an IPv4 address to be used as a shared IP address.

  • Graphic View Update to Tables
    Proxy ARP has been added as a column to the Routing Table page. Routing Table has been added as a column to the Loopback Interface page.

  • Updated CLI Output
    The "pipes" CLI command (-show <pipe>) listed the precedence levels from 0 to 7. The order has been changed to match the order in the web user interface configuration page, which is 7 to 0 with total last.

  • More Members in IPv4 Address Groups, IPv6 Address Groups and Ethernet Address Groups
    The number of allowed members in address groups has been increased from 256 to 512.

  • Renamed CLI Command
    The CLI command for resetting a device to factory settings has been renamed, to make it harder to use by mistake. The new name is "reset -factorydefault".

  • IPv6 Support for the "pcapdump" CLI Command
    It is now also possible to filter on IPv6 addresses in the "pcapdump" CLI command.

  • Updated Maintenance Menu
    The maintenance menu in the web user interface has been updated. The options "reset" and "restart" have been separated and now have a menu item of their own.

  • Updated Default Values
    The default values for some advance settings have been increased, these settings include settings for ARP Hash/Cache size.

  • Simplified System Error Reports for 64bit Versions
    Devices that crash will now generate a simplified text based version in addition to the ordinary crash dump file. The simplified version is included in the technical support file.

  • More Details in InControl Log Messages
    The log parameters "connsrcdevice", "conndestdevice", "connsrcmac" and "conndestmac" have been added to EFW logs.

  • Improvements to Cloud-init
    It is now possible to add license commands in the userdata file in a Cloud-init open-stack environment, which allows for adding SECaaS license information.

  • Update to Application Control Rules
    User authentication has been removed from Application Control rules. User authentication is instead configured on the IP Policy.

  • Removed Inline Application Control Configuration
    Configuring Application Control on IP Policies now requires a previously created Application Rule Set to be set and does not allow inline configuration. Existing configurations with inline Application Control configuration will be converted to use Application Rule Set.

  • Updated Filter Layout for IP Policies in the Web User Interface
    The filter configuration has been updated for all rules and policies to use a vertical layout instead of horizontal to accommodate new filter methods.

  • Removed Inline File Control Configuration
    Configuring File Control on an IPPolicy now requires a previously created File Control Profile to be set and does not allow inline configuration. Existing configurations with inline File Control configuration will be converted to use File Control Profile.

  • Removed Inline Anti-Virus Configuration
    Configuring Anti-Virus on an IPPolicy now requires a previously created Anti-Virus Profile to set and does not allow inline configuration. Existing configurations with inline Anti-Virus configuration will be converted to use Anti-Virus Profile.

  • Updated List of IP Policies in the Web User Interface
    The list of IP Policies in the web user interface now uses icons for options on the Policy. This allows for listing more information on the overview page.

  • Default Value for Source Address Translation
    The default value for "Source Address Translation" when adding a new IP Policy, Fallback Policy, Multicast Policy and SLB Policy has been changed from "Auto" to "None" Existing configurations will keep the current values during upgrade.

  • Updated Graph on the Dashboard
    A graph for Blacklist has been added to the dashboard. It replaces the Malware graph.

  • Updated Interface Filter for OneConnect Configuration
    The "type" filter for the OneConnect outer interface did not allow IPsec or IPsecLANtoLAN interfaces to be selected. This update makes it possible to have the OneConnect Server to listen on an IPsec interface.

  • Updated Description Texts
    Description texts have been added or improved for some objects. Descriptions for folders, mostly seen in InControl, have also been improved or added.

  • Application Control and IP Reputation in InControl Logs
    The log parameters for Application Control (like "app_name", "app_risk" and "app_family") and IP Reputation ("iprep_src", "iprep_src_score", "iprep_dest" and "iprep_dest_score") have been added to InControl logs, and can be seen in the InControl Log Explorer.

  • IPv6 Support for DNS Queries
    The CLI command "dns -query" has been extended to support IPv6 queries. The query results will show both IPv4 and IPv6 results when available.

  • Updated TLS/SSL Library
    The embedded TLS/SSL library has been updated to the latest version.

  • ACME Certificates
    384bit Elliptic Curve has been added to the existing RSA2048 and ECC256 as a supported ACME key type.

  • Settings to Advanced Tabs and Updated Design on the DHCP Server Page
    Some settings that are not that often used have been moved to advanced tabs in the web user interface. The DHCP Server page has been updated, so that the common settings are shown on the first tab.

  • Increased Length of Address Objects in the REST API
    The string length of network objects listed in the REST API (eg iprules) has been increased from 100 to 2048 characters.

  • OSPF System Information in the Technical Support File
    The Technical Support file now contains OSPF information if OSPF is enabled in the system.

  • New Date Time Picker in the Web User Interface
    The date and time picker for the Schedule Profile and Log viewer's date filter has been updated with a new design.

  • Session Manager in the Web User Interface
    Information about logged in administration users, previously available under the CLI command "sessionmanager -list", is now also available in the web user interface.

  • DHCP Server Improvement
    The option to use the same DNS servers configured for the device itself has been added to DHCP Servers.

  • Removed Legacy SSL VPN Client Installer
    The legacy SSL VPN client has been removed from the firewall and the download link from the SSL VPN portal has been removed.

  • Updated GeoIP and Ethernet Vendor Databases
    The GeoIP and Ethernet vendor databases have been updated to the latest releases.

  • New Application Control Library
    The Application Library has been updated to version 1.740. Major additions/updates:

    • Alphonso (alphonso_tv)

    • Epson EasyMP (epson_easymp)

    • Fire TV (fire_tv)

    • Freshdesk (freshdesk)

    • Freshworks (freshworks)

    • Jasper AI (jasper_ai)

    • Mailbutler (mailbutler)

    • Megacable (megacable)

    • Ring (ring)

    • Roku (roku)

    • Sanebox (sanebox)

    • Squarespace (squarespace)

    • Stability AI (stability_ai).

Chapter 3: Addressed Issues

The following sections detail the addressed issues in Clavister cOS Core 15.00.02 release.

3.1. Addressed Issues in cOS Core 15.00.02

  • COP-25266: The system could restart unexpectedly when logging NAT Pool failure.

  • COP-25168: When a VLAN interface had a "null" type interface as base interface, the firewall could restart unexpectedly. An interface could become a null interface if for example a physical interface fails to attach (e.g. hardware failure or changes to a hypervisor backend).

  • COP-25109: RADIUS NAS Port Type was incorrectly set to "none" for messages sent to the RADIUS Server when logging in on a OneConnect interface. This gave problems with for example Windows NPS. The port type has now been changed to "virtual".

  • COP-25226: Messages for errors triggered at configuration deployment used a shared output buffer that could be re-used and overwritten before printed. This sometimes led to incorrect configuration error messages.

  • COP-25279: The OpenID Connect (OIDC) subsystem was unable to parse ID Tokens with a signature longer that 512 bytes.

  • COP-25298: The CLI command "route -verbose" and "route -switched -verbose" did not print the verbose information aligned to the columns.

3.2. Addressed Issues in cOS Core 15.00.01

  • COP-25146: Connections inside OneConnect tunnels were not synced to the inactive High Availability member.

  • COP-25071: OneConnect users could sometimes be logged out from VPN sessions when logging out from the administration web user interface session within the VPN session.

  • COP-24741: ESP packets using the AES-GCM cipher were sent with incorrect padding causing some IPsec clients to drop the packets.

  • COP-25131: Routes for L2TP and PPTP interfaces were not created when "Automatically add a route for this interface using the given remote network" was checked.

  • COP-25154: DHCP padding options were incorrectly validated by the DHCP server resulting in that only part of the DHCP message was parsed. The DHCP parsing has been updated to correctly handle DHCP option padding.

  • COP-25159: OneConnect DTLS negotiation could stall if UDP packets were received in the wrong order.

  • COP-24834: The OneConnect session list could in special cases become corrupt, resulting in an unexpected restart of the firewall.

  • COP-25075: The syslog ALG handled fragmented packets incorrectly resulting in unexpected behavior.

  • COP-23902: When restoring a configuration backup, for example a converted configuration from an older firewall (eg with version 267) to a new one (eg with version 4), the "local configuration version" from the new firewall was used (eg version 4). Now the highest number of the two will be used.

  • COP-24833: The property "Groups" in the Local User Database was restricted to 127 characters but could be overloaded with many more characters, without showing anything about it being truncated. Now a configuration warning is issued when reading in a faulty configuration. A warning is also issued when entering a "Groups" property that exceeds the maximum number of characters.

  • COP-25094: Memory Log was available to use in InControl domains.

  • COP-25085: Changing index on an IP Policy (or related object) would show that something was changed in the configuration, but the detailed list of changes was empty. The list of changes now has been updated to show when indexed objects are moved.

  • COP-25103: The system could in rare occasions restart unexpectedly during SSLVPN Portal and WebUI login.

  • COP-25132: Sections with a tooltip could incorrectly show the tooltip in the wrong place on the screen.

  • COP-25133: The dashboard graphs "Application Control Data", "IP Reputation Risk" and "Web Content Filtering" used the wrong time span when rendering information. The graphs have been updated to render correct time span.

  • COP-25135: The configuration dropdown menu could sometimes contain HTML tags.

  • COP-25176: The SNMP Index was not persistent for OneConnect interfaces.

  • COP-25257: Some settings for IPv6 Prefix Delegation were not shown in InControl.

3.3. Addressed Issues in cOS Core 15.00.00

  • COP-25012: In some situations, IKE SAs remained and could not be deleted using the CLI command "ike -delete".

  • COP-24969: Using snoop commands over a netcon connection (from InControl) could cause the firewall to restart unexpectedly.

  • COP-24979: The system could sometimes restart unexpectedly in a High Availability system with a large number of IPsec SAs.

  • COP-25056: ACME certificate requests could in some rare circumstances be sent without the correct 'Content-Type' header.

  • COP-24959: The width of the memory log pages in the web user interface could sometimes, for example when the log contained IPv6 addresses, be too narrow to show the whole addresses.

  • COP-24965: The "Content Control" list for Application Rules sometimes showed unrelated protocols under inherited protocols.

  • COP-24980: System Error Report files sometimes did not include the time and date information in the filename on 64bit firewalls.

  • COP-24996: OSPF Hello packets could under certain circumstances contain an incorrect value for Active Neighbors.

  • COP-25032: The display name for log category 76 used an old label "SAAS" which is wrong. The name has been updated to the correct label "SECaaS".

  • COP-25038: When using OpenID Connect in an HA environment the device would use the private IP during the discovery which is problematic if non-public IP Addresses are used as private IP. OIDC has been updated to use the shared IP during the discovery.

  • COP-25044: The OIDC JWT header property "typ" was incorrectly marked as mandatory. Now the "typ" property has been made optional.

  • COP-25065: The OIDC JWK buffer handling the max length of the JWK property fields was too limited and has been extended.

  • COP-25084: A High Availability system with a DHCPv6 Server enabled could in rare occasions during high DHCPv6 traffic restart unexpectedly.

  • COP-25099: The DHCPv6 Client did not handle T1 and T2 set to zero in received IA_NA options.

Chapter 4: Installation Instructions

4.1. Upgrade Considerations

This section covers considerations to take into account when upgrading to the latest cOS Core version, such as configuration aspects related to changes in features or behavior of the system after upgrade.

  • Centralized Management via InControl
    When using InControl for Centralized management, make sure the latest version of InControl is used to ensure the best experience and compatibility.

4.2. Upgrading From a cOS Core 12.nn, 13.nn or 14.nn System

This section describes how to upgrade the system using the Web User Interface. For a detailed description on how to perform an upgrade using SCP please refer to the Clavister cOS Core administration guide.

To upgrade Clavister cOS Core using the Web user interface, follow these simple steps:

  • Browse to the Web User Interface and log in as a user with full administrative rights.
  • From the "Maintenance" menu select "Backup & Restore".
  • When upgrading major version, for example from 14.00.nn to 15.00.nn:
    • Click the "Backup System" button and save the file.
  • When upgrading minor version, for example from 15.00.01 to 15.00.02:
    • Click the "Backup Configuration" button and save the file.
  • From the "Maintenance" menu select "Upgrade".
  • Click the "Browse..." button and select the .upg file which contains the upgrade.
  • Click the "Upload firmware image" button to upload the image and start the upgrade procedure.
  • When the file has been uploaded, the message "Firmware upload complete" will be presented and the system will restart.
  • When the system has been restarted the login screen will appear and the system upgrade is complete.

Chapter 5: Known Limitations

  • Generation of certificates using 4096 bit size stalls firewall
    If bit size 4096 is chosen when generating certificates in the Web User Interface, the firewall will be unavailable for a short period of time with no progress indicator during this time. Affected versions: 12.00.17 and newer.

  • High Availability: Transparent Mode does not work in HA mode
    There is no state synchronization for Transparent Mode and there is no loop avoidance.

  • High Availability: PPPoE (Point-to-Point Protocol over Ethernet) is not supported in HA mode

  • High Availability: No state synchronization for Application Layer Gateways
    No aspect of Application Layer Gateways are state synchronized.
    This means that all traffic handled by ALGs will freeze when the cluster fails over to the other peer. If, however, the cluster fails back over to the original peer within approximately half a minute, frozen sessions (and associated transfers) should begin working again. Note that such failover (and consequent fallback) occurs each time a new configuration is uploaded.

  • High Availability: Tunnels unreachable from inactive node
    The inactive node in an HA cluster cannot communicate over IPsec, SSL VPN, OneConnect, Open Connect, PPTP, L2TP and GRE tunnels, as such tunnels are established to/from the active node.


    • Inactive HA member cannot send log events over tunnels.
    • Inactive HA member cannot be managed / monitored over tunnels.
    • OSPF: If the cluster members do not share a broadcast interface so that the inactive node can learn about OSPF state, OSPF failover over tunnels uses normal OSPF failover rather than accelerated (<1s) failover. This means 20-30 seconds with default settings, and 3-4 seconds with more aggressively tuned OSPF timings.

  • High Availability: No state synchronization for L2TP, PPTP, and SSL VPN tunnels
    There is no state synchronization for L2TP, PPTP and SSL VPN tunnels. On failover, incoming clients will re-establish their tunnels after the tunnels are deemed non-functional. This timeout is typically in the 30-120 seconds range.

  • High Availability: No state synchronization for IDP signature scan states
    No aspects of the IDP signature states are synchronized. This means that there is a small chance that the IDP engine causes false negatives during an HA failover.

Chapter 6: Compatibility

This section outlines the direct compatibility considerations as of cOS Core 15.00.02.

The following hardware appliances are supported as of the Clavister cOS Core 15.00.02 release. Clavister does not guarantee compatibility with other hardware appliances.

  • Clavister NetWall E10
  • Clavister NetWall E20
  • Clavister NetWall E80
  • Clavister NetWall W20
  • Clavister NetWall W30
  • Clavister NetWall W40
  • Clavister NetWall W50
  • Clavister NetWall 100 Series
  • Clavister NetWall 200R Series
  • Clavister NetWall 300 Series
  • Clavister NetWall 500 Series
  • Clavister NetWall 6000 Series

Chapter 7: Licensing

Clavister cOS Core 15.00.02 requires a Clavister subscription covering May 1, 2025. Make sure that this is covered before trying to upgrade the system, otherwise the system will enter a "License Lockdown" mode.

Chapter 8: Getting Help

Technical Assistance via MyClavister
We offer timely and rapid response to customer inquiries and service requests via our web based support tool. Do not hesitate to contact us if you have any questions regarding the upgrade or installation procedure.

Clavister Technical Support
https://www.clavister.com/my-clavister/help-desk/