dslreports logo
 
    All Forums Hot Topics Gallery
spc
uniqs
19

Bill_MI
Bill In Michigan
MVM
join:2001-01-03
Royal Oak, MI
TP-Link Archer C7
Linksys WRT54GS
Linksys WRT54G v4

Bill_MI to XXagon

MVM

to XXagon

Re: Verizon Westell 2200 latest Firmware Upgrade

I'm curious what page that is? Not running NAT the internal web update doesn't function and is set to:

www.westell.com/upgrades/model2200/Verizon/A99-220015-00.xml

In fact, I'm not certain if it can be alternately accessed... or MSIE understands XML or not!
XXagon
join:2001-05-31
Flushing, NY

XXagon

Member

The page is:
»www.verizon.net/2200upgrade

My curiosity peaked when I read this: "If you are unable or do not download the patch by November 20,2003 we may need to temporarily block your DSL connection....."

It looks like this is a crucial patch so I was wondering what it changes as they offered no info.

Bill_MI
Bill In Michigan
MVM
join:2001-01-03
Royal Oak, MI
TP-Link Archer C7
Linksys WRT54GS
Linksys WRT54G v4

Bill_MI

MVM

There's more here: »verizon demands westell 2200 patch be installed

Looks like everyone else is speculating, too. With lack of info they deserve such...

FLASH: Don't miss Dan's post of the inside scoop in the above link. Us non-Verizon customers can't see those news groups.
93254336 (banned)
Weapons Of Masturbation
join:2001-10-20

93254336 (banned)

Member

Here's the info from Verizon on the Westell 2200 patch:

»Re: verizon demands westell patch be installed

- Dan
XXagon
join:2001-05-31
Flushing, NY

XXagon to Bill_MI

Member

to Bill_MI
Here's the poop. Came across this in another forum:

There are a couple of issues with the Westell 2200 modem that the
firmware update addresses.

First, the 2200 has a built-in PPPoE shim that is set to log into the
VOL network by default - this can cause authentication floods if a
customer has another PPPoE client within their PC or stand-alone
router. If the username/password settings are wrong within the 2200
or a stand-alone PPPoE client, then the authentication failures are
overloading the authentication routers due to the time interval
between the authentication attempts. So changing the 2200 to bridge
mode will stop the 2200's PPPoE shim from attempting to authenticate.
The firmware update changes the time interval between the
PPPoE authentication attempts for the 2200's built-in PPPoE shim.

Second, the firmware update changes the 2200's built-in firewall
default setting from medium to low. This is being done to allow a
greater number of software applications to be compatible with the
2200. Customers are still able to change the firewall
configuration, but it was determined that configuring the firewall
setting to low during the initial account/modem setup provided a
greater degree of account setup success.

There are a few other minor tweaks in the firmware update....