Features
- Support has been added for the HTTP/2 protocol over HTTPS. [BNADC-7208]
Enhancements
- High Availability now supports automatic failover in case a critical process fails on an active device. [BNADC-1485]
- Server health checks now support HTTP/1.0 and HTTP/1.1. [BNADC-5632]
- The internal platform utilities and kernel have been upgraded. [BNADC-6461]
- LDAP nested groups across different domains are now supported. [BNADC-7595]
- The FTP access log can now be exported instantly. [BNADC-8408]
Fixes
- Global Server Load Balancing (GSLB) can now process traffic without interruption. [BNADC-7021]
- The serial number of the clustered peer Barracuda Load Balancer ADC is now displayed on the ADVANCED > High Availability page in the Clustered System section. [BNADC-7101]
- Both units in a high availability cluster are in the active state. This has been addressed. [BNADC-7134]
- You can now specify the maximum number of times a user can attempt to authenticate. [BNADC-7392]
- When starting Instant SSL with an existing HTTP service, there are duplicate database variables. This has been addressed. [BNADC-7471]
- A report is now sent when an SMTP server is configured with a username and password. [BNADC-7866]
- A character is being removed while completing a SharePoint rewrite. This has been addressed. [BNADC-7933]
- Dual Authentication is now supported with LDAP as the primary authentication service and Radius as the secondary authentication service. [BNADC-8022]
- The initial characters of a certificate name can now include numbers. [BNADC-8137]
- If you set Enable High Availability to Yes, the default value for Failback Mode is now set to Manual. [BNADC-8155]
- Changing the service type from INSTANT SSL to HTTP/HTTPS and then back to INSTANT SSL now correctly creates the Redirect service. [BNADC-8422]
- After upgrading the firmware, the system failed to reboot due to a networking issue. This has been addressed. [BNADC-8449]
- If the LDAP authentication service's default role is changed by the administrator in the ADVANCED > Admin Access Control page, the role of LDAP mapped users is not changed. [BNADC-8453]
- The domain name can now be sent along with the username to the Radius server for user authentication. [BNADC-8598]