VIA 4.7.0 Release Notes
Features
Enhancement of Failover Mechanisms
VIA 4.7 enhances how failover behaviors are handled. The failover mechanism will work as follows:
• Primary Controller Selection: VIA will consider primary controller for connections as configured in the connection profile.
• Unreachability Test: VIA terminates the tunnel once the controller is unreachable and will use Heartbeat functionality to test the unreachability of controllers.
• Moving to the Next Controller: If VIA determines the controller is unreachable, it selects the next controller in the configured list. If load balance is enabled, the selection of the next controller is randomized, otherwise the selection follows a cascading use process.
Supported platforms: Windows, macOS, iOS, Linux, Android.
Improvement of the GUI
VIA 4.7 improves the accessibility options of the GUI, including keyboard functions and sound if needed.
Supported platforms: Windows, macOS, iOS, Linux, Android.
GPG System Migration
Starting VIA 4.7, HPE standard GPG keys are used to sign the installer package.
Supported platforms: Linux.
Auto-update VPN profiles
In VIA 4.7, updates of VPN profiles are automatic, without needing to disconnect and reconnect, or to delete and re-add the profile.
Supported platforms: Android, iOS.
Downgrades and Upgrades in VIA 4.7
Downgrades and upgrades are available between VIA versions 4.7 and 4.6.
Supported platforms: Windows.
Resolved Issues
Platform | Issue ID | Description |
---|---|---|
Android |
VIA-4133 |
Devices running Android were unable to use Multi-Factor Authentication. |
Windows |
VIA-4127 |
When disabling allow-user-disconnect from the VIA connection profile, some users were still able to disconnect from the minimized icon. |
Android |
VIA-4072 |
Devices running Android were unable to authenticate as both client and root CAs were sent to the OCSP, causing an error shown as Unknown. The fix authenticates the certificates separately. |
Android |
VIA-4017 |
Devices running Android did not show the correct IP address when mobile data was turned on. |
All |
VIA-3999 VIA-3996 VIA-3992 VIA-3989 |
Some devices were unable to initiate failover as expected when the IP address was unreachable. |
Windows |
VIA-3987 |
Some clients were unexpectedly disconnected from VIA after 20 seconds. |
Windows |
VIA-3943 |
The MTU value set in via-connection profile incorrectly changed to 1500. |
Windows |
VIA-3911 |
Devices running Windows display the error virtual adapter cannot be enabled in upgrade, downgrade or hibernate scenarios. |
Known Issues
Platform | Issue ID | Description |
---|---|---|
Mac |
VIA-4174 |
In dialog pop-up screens, the voiceover incorrectly detects elements behind those screens. |
Mac |
VIA-4166 |
Some user-defined announcements are missed by the voiceover when VIA is launched using a tray menu. Workaround: Re-start voiceover functionality. |
Windows |
VIA-4079 |
VIA failover does not work as expected when Max Reconnect Attempt is set to 0. |
Windows |
VIA-4088 |
In some downgrade or upgrade cases, devices running Windows are required to restart due to a driver update. |
Linux |
VIA-4151 VIA-4152 |
Devices running Linux might encounter issues related to the screen reader accessibility feature. |
Linux |
VIA-4165 |
Devices running Linux do not boot up VIA application as expected after an auto-upgrade, which requires users to manually open VIA or to restart their device. |
iOS |
VIA-4199 |
Devices running iOS may encounter unstable tunnels due to lack of IKEv2 Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for authentication. See RFC 4306. policies and IKEv2 Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for authentication. See RFC 4306. IPsec Internet Protocol security. IPsec is a protocol suite for secure IP communications that authenticates and encrypts each IP packet in a communication session. dynamic maps. |
Was this information helpful?
Great! Thanks for the feedback
Sorry about that! How can we improve our documentation? Send your comments and suggestions!