Orbit MCR Release Notes Rev AS - 9.6.15
Orbit MCR Release Notes Rev AS - 9.6.15
V9.6.15
RELEASE NOTE For: MDS ORBIT MCR/ECR Firmware Version 9.6.15
RELEASE DATE: January 27, 2025 FIRMWARE
New Features
3. Firewall Robustness
● The Orbit Firewall is a powerful tool for restricting unintended traffic. As a protective measure, if the
Orbit Firewall ever experiences an unexpected error, all traffic is dropped with the exception of HTTPS
and SSH protocols. These protocols can be used to recover the device to a functional state.
Known Errata
o When using GPS with the 4GY cell module, once the GPS obtains a fix it will continue to report erroneous
data after the fix is lost. Reboot the device to effect a recovery. [7798]
o WebUI of PEM Private Keys may fail with some files. If this occurs, import the key via the CLI (for
example using a TFTP server). [7489]
o For configurations using 3-port LN operation, changes to modulation may require a reboot. Use caution
when changing remotely. [6243]
o Do not delete certificates or keys that are actively in use. Deleting active keys may produce many errors
including display issues on the web interface. [6241]
o For Terminal Server settings, when Vmin is set to 0 on a physical COM port (like COM1), the Vtime setting
is treated like 0 which will cause packet fragmentation. Workaround is to set Vmin to 16384 to allow the
Vtime value to be used as intended. [6091]
o When using OpenVPN, if data is not able to pass over the VPN or the status page indicates that the
service is in error, then the unit must be rebooted to recover. [5857]
o For MPRS, when updating Firmware a reboot may sometimes be required. [5853]
o For W51 WiFi, when changing device mode, make sure device is disabled first, then re-enable device in
new mode [5850]
o In some newer ECR devices, the ingress rate limiting user interface will not include an Ingress Burst value.
Ingress Rate is also restricted to specific values (64-40000, 45000, 50000, 67000, and 75000kbps). [5847]
o The W53 Wi-Fi module in 802.11g mode may experience low upstream throughput. [5827]
o When changing the TX power of the W53 Wi-Fi, the device needs to be either disabled and re-enabled, or
the entire system rebooted for the change in power to take effect. [5803]
o Firewall filters that have a layer 2 rule can only be applied to a bridge or VLAN interface. They will not be
displayed in the tab complete or pulldown menus for other types of interfaces. [5644]
o When using MPRS to broadcast reprogram SD radios, if remote detection is enabled, then we recommend
increasing the reprogram repeat value from 3 to 6. [5643]
o Avoid binding a service to a radio interface. This may cause erratic behavior. [5422]
o When using OpenVPN, verify that the clients are connecting properly. An errant client can prevent a valid
client from connecting correctly. [5295]
o Binding the SSH, SNMP, or NETCONF service to an IPv4 or IPv6 address can cause boot errors if that
address's interface is not up at the time of boot. This can happen if the unit is rebooted with the interface