VIA 4.7.0 Release Notes

Features

Enhancement of Failover Mechanisms

VIA 4.7 enhances how failover behaviors are handled. The failover mechanism will work as follows:

Primary Controller Selection: VIA will consider primary controller for connections as configured in the connection profile.

Unreachability Test: VIA terminates the tunnel once the controller is unreachable and will use Heartbeat functionality to test the unreachability of controllers.

Moving to the Next Controller: If VIA determines the controller is unreachable, it selects the next controller in the configured list. If load balance is enabled, the selection of the next controller is randomized, otherwise the selection follows a cascading use process.

Supported platforms: Windows, macOS, iOS, Linux, Android.

Improvement of the GUI

VIA 4.7 improves the accessibility options of the GUI, including keyboard functions and sound if needed.

Supported platforms: Windows, macOS, iOS, Linux, Android.

GPG System Migration

Starting VIA 4.7, HPE standard GPG keys are used to sign the installer package.

Supported platforms: Linux.

Auto-update VPN profiles

In VIA 4.7, updates of VPN profiles are automatic, without needing to disconnect and reconnect, or to delete and re-add the profile.

Supported platforms: Android, iOS.

Downgrades and Upgrades in VIA 4.7

Downgrades and upgrades are available between VIA versions 4.7 and 4.6.

Supported platforms: Windows.

Resolved Issues

Table 1: Resolved Issues in VIA 4.7.0

Platform Issue ID Description

Android

VIA-4133

Devices running Android were unable to use Multi-Factor Authentication.

Windows

VIA-4127

When disabling allow-user-disconnect from the VIA connection profile, some users were still able to disconnect from the minimized icon.

Android

VIA-4072

Devices running Android were unable to authenticate as both client and root CAs were sent to the OCSP, causing an error shown as Unknown. The fix authenticates the certificates separately.

Android

VIA-4017

Devices running Android did not show the correct IP address when mobile data was turned on.

All

VIA-3999

VIA-3996

VIA-3992

VIA-3989

Some devices were unable to initiate failover as expected when the IP address was unreachable.

Windows

VIA-3987

Some clients were unexpectedly disconnected from VIA after 20 seconds.

Windows

VIA-3943

The MTU value set in via-connection profile incorrectly changed to 1500.

Windows

VIA-3911

Devices running Windows display the error virtual adapter cannot be enabled in upgrade, downgrade or hibernate scenarios.

Known Issues

Table 2: Known Issues in VIA 4.7.0

Platform Issue ID Description

Mac

VIA-4174

In dialog pop-up screens, the voiceover incorrectly detects elements behind those screens.

Mac

VIA-4166

Some user-defined announcements are missed by the voiceover when VIA is launched using a tray menu.

Workaround: Re-start voiceover functionality.

Windows

VIA-4079

VIA failover does not work as expected when Max Reconnect Attempt is set to 0.

Windows

VIA-4088

In some downgrade or upgrade cases, devices running Windows are required to restart due to a driver update.

Linux

VIA-4151

VIA-4152

Devices running Linux might encounter issues related to the screen reader accessibility feature.

Linux

VIA-4165

Devices running Linux do not boot up VIA application as expected after an auto-upgrade, which requires users to manually open VIA or to restart their device.

iOS

VIA-4199

Devices running iOS may encounter unstable tunnels due to lack of IKEv2 Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for authentication. See RFC 4306.  policies and IKEv2 Internet Key Exchange version 2. IKEv2 uses the secure channel established in Phase 1 to negotiate Security Associations on behalf of services such as IPsec. IKEv2 uses pre-shared key and Digital Signature for authentication. See RFC 4306.  IPsec Internet Protocol security. IPsec is a protocol suite for secure IP communications that authenticates and encrypts each IP packet in a communication session. dynamic maps.