Release Notes for Software Version E.11.21 - 5300xl

Release Notes:
Version E.11.21 Software
for the ProCurve Series 5300xl Switches
Release E.11.21 supports these switches:
■
ProCurve Switch 5304xl (J4850A)
■
ProCurve Switch 5308xl (J4819A)
■
ProCurve Switch 5348xl (J4849A) – 48-port (10/100) bundle in Switch 5304xl chassis
■
ProCurve Switch 5372xl (J4848A) – 72-port (10/100) bundle in Switch 5308xl chassis
■
ProCurve Switch 5304xl-32G (J8166A) – 32-port (10/100/1000) bundle in 5304xl chassis
■
ProCurve Switch 5308xl-48G (J8167A) – 48-port (10/100/1000) bundle in 5308xl chassis
These release notes include information on the following:
Downloading Switch Documentation and Software from the Web (page 1)
■
Clarification of operating details for certain software features (page 21)
■
Software enhancements available in releases E.10.03 through E.11.21 (page 27)
■
A listing of software fixes included in releases E.06.01 through E.11.21 (page 110)
■
Important Support Notes about FEC, CDP removal and backward configuration compatibility (page 21)
■
Boot ROM Update Required!
A successful update to E.11.02 or newer requires updating the 5300xl with the current Boot ROM version, E.05.05.
The E.05.05 Boot ROM image was automatically installed on any switch running E.10.64 through E.10.74 software
versions. If your 5300xl is currently running a pre-E.07.37 software build, you must update the Boot ROM TWICE
before installing E.11.xx. Please see details in the table below.
If your current version is:
E.05.04 through E.07.34
E.07.35 through E.10.62
E.10.64 or newer
Your next step should be:
Update and reload into software version: E.07.40.
Update and reload into software version E.10.74.
Update directly to software version E.11.xx
Security Note
Downloading and booting software release E.11.03 or greater for the first time automatically enables
SNMP access to the hpSwitchAuth MIB objects. If this is not desirable for your network, ProCurve
recommends that you disable it after downloading and rebooting with the latest switch software.
© Copyright 2001, 2008-2010
Hewlett-Packard Development Company, LP.
The information contained herein is subject to change
without notice.
Publication Number
Part Number 5990-6004
June 2010
Applicable Product
ProCurve Switch 5304xl
ProCurve Switch 5308xl
ProCurve Switch 5348xl
ProCurve Switch 5372xl
ProCurve Switch 5304xl-32G
ProCurve Switch 5308xl-48G
(J4850A)
(J4819A)
(J4849A)
(J4848A)
(J8166A)
(J8167A)
Disclaimer
HEWLETT-PACKARD COMPANY MAKES NO WARRANTY
OF ANY KIND WITH REGARD TO THIS MATERIAL,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS
FOR A PARTICULAR PURPOSE. Hewlett-Packard shall not
be liable for errors contained herein or for incidental or
consequential damages in connection with the furnishing,
performance, or use of this material.
The only warranties for HP products and services are set
forth in the express warranty statements accompanying
such products and services. Nothing herein should be
construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions
contained herein.
Hewlett-Packard assumes no responsibility for the use or
reliability of its software on equipment that is not furnished
by Hewlett-Packard.
Trademark Credits
Microsoft®, Windows®, and Windows NT® are US
registered trademarks of Microsoft Corporation.
Adobe® and Acrobat® are trademarks of Adobe Systems
Incorporated. Java™ is a US trademark of Sun
Microsystems, Inc.
Software Credits
SSH on ProCurve Switches is based on the OpenSSH software toolkit. This product includes software developed by
the OpenSSH Project for use in the OpenSSH Toolkit. For
more information on OpenSSH, visit
http:// www.openssh.com.
SSL on ProCurve Switches is based on the OpenSSL software toolkit. This product includes software developed by
the OpenSSL Project for use in the OpenSSL Toolkit. For
more information on OpenSSL, visit
http://www.openssl.org.
This product includes cryptographic software written by
Eric Young ([email protected]). This product includes
software written by Tim Hudson ([email protected])
Hewlett-Packard Company
8000 Foothills Boulevard, m/s 5551
Roseville, California 95747-5551
www.procurve.com
Warranty
See the Customer Support/Warranty booklet included with
the product.
A copy of the specific warranty terms applicable to your
Hewlett-Packard products and replacement parts can be
obtained from your HP Sales and Service Office or
authorized dealer.
Contents
Software Management
Software Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Downloading Switch Documentation and Software from the Web . . . . . . . . . . . . . . . . . . . . . . . . 1
Downloading Software to the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
TFTP Download from a Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Xmodem Download From a PC or Unix Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Saving Configurations While Using the CLI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
ProCurve Switch, Routing Switch, and Router Software Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Minimum Software Versions for Series 5300xl Switch Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
OS/Web/Java Compatibility Table . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Support Notes
Caution: Start-up Config File Compatibility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
FEC, CDP Removal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Enforcing Switch Security
Switch Management Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Default Settings Affecting Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Local Manager Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Inbound Telnet Access and Web Browser Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Secure File Transfers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
SNMP Access (Simple Network Management Protocol) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Front-Panel Access and Physical Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Other Provisions for Management Access Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Network Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Web and MAC Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Secure Shell (SSH) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Secure Socket Layer (SSLv3/TLSv1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Traffic/Security Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
802.1X Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Port Security, MAC Lockdown, MAC Lockout, and IP Lockdown . . . . . . . . . . . . . . . . . . . . . . . . 18
Identity-Driven Manager (IDM) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
iii
Clarifications
HP Security Policy and Release Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
LLDP and LACP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Non-Genuine Mini-GBIC Detection and Protection Initiative . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Mesh Design Optimization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
General Switch Traffic Security Guideline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
The Management VLAN IP Address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Heavy Memory Usage with PIM-DM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Change in QoS Priority and Policy Limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Inter-operating with 802.1s Multiple Spanning-Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Rate-Limiting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Time Zone Offset . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Known Issues
Enhancements
Release E.10.03 through E.10.23 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Release E.10.24 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
CLI Port Rate Display . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Releases E.10.25 and E.10.26 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Release E.10.27 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
MSTP Default Path Cost Controls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Release E.10.28 through E.10.29 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Release E.10.30 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Release E.10.31 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Release E.10.32 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Using Fastboot To Reduce Boot Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
DHCP Option 82: Using the Management VLAN IP Address for the Remote ID . . . . . . . . . . . . 29
Release E.10.33 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Releases E.10.34 through E.10.35 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Release E.10.36 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
SFlow Show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Release E.10.37 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
iv
Spanning Tree Show Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Release E.10.38 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Release E.10.39 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Release E.10.40 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Release E.10.41 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Release E.10.42 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Uni-Directional Link Detection (UDLD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Configuring 802.1X Controlled Directions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Release E.10.43 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Release E.10.44 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
DHCP Snooping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Release E.10.46 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Spanning Tree BPDU Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Example of BPDU Protection Additions to Show Spanning Tree Command . . . . . . . . . . . . . . . 61
Release E.10.47 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Release E.10.48 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Configuring Loop Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Release E.10.49 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Spanning Tree Per-Port BPDU Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Release E.10.50 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Release E.10.51 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Release E.10.52 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Release E.10.53 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Release E.10.54 and E.10.55 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Release E.10.56 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.57 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Releases E.10.58 and E.10.59 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.60 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.61 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.62 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.63 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Release E.10.64 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
v
Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Enabling Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Configuring Trusted Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Adding an IP-to-MAC Binding to the DHCP Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Configuring Additional Validation Checks on ARP Packets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Verifying the Configuration of Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Displaying ARP Packet Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Monitoring Dynamic ARP Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Release E.10.65 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Release E.10.66 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Release E.10.67 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Release E.10.68 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.69 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.70 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.71 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.72 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.73 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.10.74 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Release E.11.02 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Using SNMP To View and Configure Switch Authentication Features . . . . . . . . . . . . . . . . . . . . 77
Operating Rules for 5300xl Series 10-GbE Port Trunks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
ARP Age Timer Increase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
How RADIUS-Based Authentication Affects VLAN Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
System Location and Contact String Size Increase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Show VLAN ports CLI Command Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Configuring the Privilege-Mode Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Send SNMP v2c Informs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
RADIUS Server Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Concurrent TACACS+ and SFTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
MSTP VLAN Configuration Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Rebooting and Reloading the Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Release E.11.03 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release E.11.04 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
vi
Release E.11.05 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release E.11.06 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release E.11.07 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Release E.11.08 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release E.11.09 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release E.11.10 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release E.11.11 Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Configuring Transceivers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Release E.11.12 through E.11.15 Enhancements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Release E.11.16 Enhancement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Accounting Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Software Fixes
Release E.06.01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Release E.06.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Release E.06.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Release E.06.05 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Release E.06.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Release E.07.21 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
Release E.07.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Release E.07.27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Release E.07.29 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Release E.07.30 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Release E.07.34 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Release E.07.37 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Release E.07.40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Release E.08.01 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Release E.08.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Release E.08.07 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Release E.08.30 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Release E.08.42 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Release E.08.53 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
vii
Release E.09.02 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Release E.09.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
Release E.09.04 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Release E.09.05 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Release E.09.06 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Release E.09.07 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Release E.09.08 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Release E.09.09 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Release E.09.10 (Not a General Release) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Release E.09.21 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131
Release E.09.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Release E.09.23 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Release E.09.24 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Release E.09.25 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Release E.09.26 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Release E.09.29 (Beta Only) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Release E.10.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Release E.10.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
Release E.10.04 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Release E.10.05 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
Release E.10.06 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Release E.10.07 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Release E.10.08 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Release E.10.09 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
Release E.10.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Release E.10.20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Release E.10.21 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Release E.10.22 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
Release E.10.23 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Release E.10.24 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Release E.10.25 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
viii
Release E.10.26 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Release E.10.27 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
Release E.10.30 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Release E.10.31 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Release E.10.32 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Release E.10.33 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Release E.10.34 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Release E.10.35 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Release E.10.36 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Release E.10.37 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Release E.10.38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Release E.10.39 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Release E.10.40 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
Release E.10.41 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Release E.10.42 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Release E.10.43 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
Release E.10.44 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Release E.10.45 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Release E.10.46 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Release E.10.47 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Release E.10.48 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Release E.10.49 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Release E.10.50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Release E.10.51 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Release E.10.52 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Release E.10.53 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Release E.10.54 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Release E.10.55 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Release E.10.56 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Release E.10.57 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Releases E.10.58 and E.10.59 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
ix
Release E.10.60 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Release E.10.61 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Release E.10.62 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Release E.10.63 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Release E.10.64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Release E.10.65 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Release E.10.66 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Release E.10.67 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Release E.10.68 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Release E.10.69 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Release E.10.70 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Release E.10.71 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Release E.10.72 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Release E.10.73 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Release E.10.74 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Release E.11.02 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
Release E.11.03 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
Release E.11.04 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Release E.11.05 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
Release E.11.06 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Release E.11.07 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Release E.11.08 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
Release E.11.09 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Release E.11.10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
Release E.11.11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Release E.11.12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Release E.11.13 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Release E.11.14 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165
Release E.11.15 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Release E.11.16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Release E.11.17 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
x
Release E.11.18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Release E.11.19 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Release E.11.20 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Release E.11.21 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
xi
Software Management
Software Management
Software Updates
Check the ProCurve Networking Web site frequently for software updates for the various
ProCurve switches you may have in your network.
Downloading Switch Documentation and Software from the Web
You can download software updates and the corresponding product documentation from HP’s
ProCurve web site as described below.
To Download a Software Version:
1.
Go to the ProCurve Networking Web site at:
http://www.procurve.com/software.
2.
Under Latest software, click on Switches.
To Download Product Documentation: You will need the Adobe® Acrobat® Reader to view,
print, and/or copy the product documentation.
1.
Go to ProCurve web site at http://www.procurve.com/manuals.
2.
Click on the name of the product for which you want documentation.
3.
On the resulting web page, double-click on a document you want.
4.
When the document file opens, click on the disk icon
copy of the file.
1
in the Acrobat® toolbar and save a
Software Management
Downloading Software to the Switch
Downloading Software to the Switch
Caution
The startup-config file generated by the latest software release may not be backward-compatible with
the same file generated by earlier software releases. Refer to “Boot ROM Update Required!” on the
front page.
HP periodically provides switch software updates through the ProCurve Networking Web site at
http://www.procurve.com/software. After you acquire the new software file, you can use one of the
following methods for downloading it to the switch:
■
For a TFTP transfer from a server, do either of the following:
•
■
Click on Download OS in the Main Menu of the switch’s menu interface and use the
(default) TFTP option.
• Use the copy tftp command in the switch’s CLI (see below).
For an Xmodem transfer from a PC or Unix workstation, do either of the following:
•
Click on Download OS in the Main Menu of the switch’s menu interface and select the
Xmodem option.
■
• Use the copy xmodem command in the switch’s CLI (page 4).
Use the download utility in ProCurve Manager Plus.
■
A switch-to-switch file transfer
Note
Downloading new software does not change the current switch configuration. The switch configuration is contained in a separate file that can also be transferred, for example, for archive purposes
or to be used in another switch of the same model.
This section describes how to use the CLI to download software to the switch. You can also use the
menu interface for software downloads. For more information, refer to the Management and
Configuration Guide for your switch.
2
Software Management
Downloading Software to the Switch
TFTP Download from a Server
Syntax:
copy tftp flash <ip-address> <remote-os-file> [< primary | secondary >]
Note that if you do not specify the flash destination, the TFTP download defaults to the primary flash.
For example, to download a software file named E_10_2 x .swi from a TFTP server with the IP address
of 10.28.227.103:
1.
Execute the copy command as shown below:
ProCurve # copy tftp flash 10.28.227.103 E_10_2x.swi
The primary OS image will be deleted. continue [y/n]? Y
03125K
2.
When the switch finishes downloading the software file from the server, it displays the progress
message:
Validating and Writing System Software to FLASH.
When the CLI prompt re-appears, the switch is ready to reboot to activate the downloaded
software
3.
Reboot the switch.
After the switch reboots, it displays the CLI or Main Menu, depending on the Logon Default setting
last configured in the menu’s Switch Setup screen.
3
Software Management
Downloading Software to the Switch
Xmodem Download From a PC or Unix Workstation
This procedure assumes that:
■
The switch is connected via the Console RS-232 port on a PC operating as a terminal. (Refer to
the Installation Guide you received with the switch for information on connecting a PC as a
terminal and running the switch console interface.)
■
The switch software is stored on a disk drive in the PC.
■
The terminal emulator you are using includes the Xmodem binary transfer feature. (For example,
in the Microsoft Windows NT® terminal emulator, you would use the Send File option in the
Transfer drop-down menu.)
Syntax:
copy xmodem flash < unix | pc >
For example, to download a software file from a PC:
1.
To reduce the download time, you may want to increase the baud rate in your terminal emulator
and in the switch to a value such as 57600 bits per second. (The baud rate must be the same in
both devices.) For example, to change the baud rate in the switch to 57600, execute this
command:
ProCurve(config)# console baud-rate 57600
(If you use this option, be sure to set your terminal emulator to the same baud rate.)
2.
Execute the following command in the CLI:
ProCurve # copy xmodem flash primary
The primary OS image will be deleted. continue [y/n]? Y
Press ‘enter’ and start XMODEM on your host . . .
3.
Execute the terminal emulator commands to begin the Xmodem transfer. The download can take
several minutes, depending on the baud rate used in the transfer.
4.
Reboot the switch.
After the switch reboots, it displays the CLI or Main Menu, depending on the Logon Default setting
last configured in the menu’s Switch Setup screen.
5.
Use the following command to confirm that the software downloaded correctly:
ProCurve> show system
Check the Firmware revision line to verify that the switch downloaded the new software.
6.
If you increased the baud rate on the switch (step 1), use the same command to return it to its
previous setting. (HP recommends a baud rate of 9600 bits per second for most applications.)
Remember to return your terminal emulator to the same baud rate as the switch.
4
Software Management
Saving Configurations While Using the CLI
Saving Configurations While Using the CLI
The switch operates with two configuration files:
■
Running-Config File: Exists in volatile memory and controls switch operation. Rebooting
the switch erases the current running-config file and replaces it with an exact copy of the
current startup-config file. To save a configuration change, you must save the running
configuration to the startup-config file.
■
Startup-Config File: Exists in flash (non-volatile) memory and preserves the most recentlysaved configuration as the “permanent” configuration. When the switch reboots for any
reason, an exact copy of the current startup-config file becomes the new running-config file
in volatile memory.
When you use the CLI to make a configuration change, the switch places the change in the runningconfig file. If you want to preserve the change across reboots, you must save the change to the startupconfig file. Otherwise, the next time the switch reboots, the change will be lost. There are two ways
to save configuration changes while using the CLI:
■
Execute write memory from the Manager, Global, or Context configuration level.
■
When exiting from the CLI to the Main Menu, press [Y] (for Yes) when you see the “Do you
want to save current configuration [y/n]?” prompt.
5
Software Management
ProCurve Switch, Routing Switch, and Router Software Keys
ProCurve Switch, Routing Switch, and Router Software Keys
Software
Letter
ProCurve Networking Products
C
1600M, 2400M, 2424M, 4000M, and 8000M
CY
Switch 8100fl Series (8108fl and 8116fl)
E
Switch 5300xl Series (5304xl, 5308xl, 5348xl, and 5372xl)
F
Switch 2500 Series (2512 and 2524), Switch 2312, and Switch 2324
G
Switch 4100gl Series (4104gl, 4108gl, and 4148gl)
H
Switch 2600 Series, Switch 2600-PWR Series: H.07.81 and earlier, or H.08.55 and greater,
Switch 2600-8-PWR requires H.08.80 or greater.
Switch 6108: H.07.xx and earlier
I
Switch 2800 Series (2824 and 2848)
J
J.xx.xx.biz Secure Router 7000dl Series (7102dl and 7203dl)
J.xx.xx.swi Switch 2520G Series (2520G-8-PoE, 2520G-24-PoE)
K
Switch 3500yl Series (3500yl-24G-PWR and 3500yl-48G-PWR), Switch 6200yl-24G, 5400zl Series (5406zl,
5406zl-48G, 5412zl, 5412zl-96G), Switch 8212zl and Switch 6600 Series (6600-24G, 6600-24G-4XG, 6600-24XG).
L
Switch 4200vl Series (4204vl, 4208vl, 4202vl-72, and 4202vl-48G)
M
Switch 3400cl Series (3400-24G and 3400-48G): M.08.51 though M.08.97, or M.10.01 and greater;
Series 6400cl (6400cl-6XG CX4, and 6410cl-6XG X2): M.08.51 though M.08.95, or M.08.99 to M.08.100 and
greater.
N
Switch 2810 Series (2810-24G and 2810-48G)
P
Switch 1810G (1810G-8, 1810G-24)
PA/PB
Switch 1800 Series (Switch 1800-8G – PA.xx; Switch 1800-24G – PB.xx)
Q
Switch 2510 Series (2510-24)
R
Switch 2610 Series (2610-24, 2610-24/12PWR, 2610-24-PWR, 2610-48 and 2610-48-PWR)
S
Switch 2520 Series (2520-8-PoE, 2520-24-PoE)
T
Switch 2900 Series (2900-24G and 2900-48G)
U
Switch 2510-48
W
Switch 2910al Series (2910al-24G, 2910al-24G-PoE+, 2910al-48G, and 2910al-48G-PoE+)
VA/VB
WA
Switch 1700 Series (Switch 1700-8 - VA and 1700-24 - VB)
ProCurve Access Point 530
6
Software Management
ProCurve Switch, Routing Switch, and Router Software Keys
Software
Letter
WM
ProCurve Access Point 10ag
WS
ProCurve Wireless Edge Services xl Module and the ProCurve Redundant Wireless Services xl Module
WT
ProCurve Wireless Edge Services zl Module and the ProCurve Redundant Wireless Services zl Module
Y
Switch 2510G Series (2510G-24 and 2510G-48)
Z
ProCurve 6120G/XG and 6120XG Blade Switches
numeric
7
ProCurve Networking Products
Switch 9408sl, Switch 9300 Series (9304M, 9308M, and 9315M), Switch 6208M-SX and Switch 6308M-SX
(Uses software version number only; no alphabetic prefix. For example 07.6.04.)
Software Management
Minimum Software Versions for Series 5300xl Switch Features
Minimum Software Versions for Series 5300xl Switch Features
For Switch 5300xl Hardware Devices
ProCurve Device
Product Number
Minimum Supported
Software Version
ProCurve 100-BX-D SFP-LC Transceiver
J9099B
E.11.09
ProCurve 100-BX-U SFP-LC Transceiver
J9100B
E.11.09
ProCurve 1000-BX-D SFP-LC Mini-GBIC
J9142B
E.11.09
ProCurve 1000-BX-U SFP-LC Mini-GBIC
J9143B
E.11.09
ProCurve 1-Port 10-GbE X2 Module
J8988A
E.11.02
ProCurve Wireless Edge Services xl Module
J9001A
E.10.30
ProCurve Redundant Wireless Services xl Module
J9003A
E.10.30
ProCurve 1000Base-T Mini-GBIC
J8177B
E.09.22
ProCurve Access Controller xl Module
J8162A
E.09.21
ProCurve 16-Port 10/100/1000-T Module
J4907A
E.08.42
ProCurve 24-Port 10/100-TX PoE Module
J8161A
E.08.22
ProCurve 12-Port 100-FX MTRJ Module
J4852A
E.06.10
ProCurve Gigabit-LH-LC Mini-GBIC
J4860B
E.06.01
ProCurve Gigabit-LH-LC Mini-GBIC
J4860B
E.06.01
ProCurve Gigabit-LH-LC Mini-GBIC
J4860A
E.06.01
ProCurve Gigabit-LX-LC Mini-GBIC
J4859C
E.05.04
ProCurve Gigabit-LX-LC Mini-GBIC
J4859B
E.05.04
ProCurve Gigabit-LX-LC Mini-GBIC
J4859A
E.05.04
ProCurve Gigabit-SX-LC Mini-GBIC
J4858C
E.05.04
ProCurve Gigabit-SX-LC Mini-GBIC
J4858B
E.05.04
ProCurve Gigabit-SX-LC Mini-GBIC
J4858A
E.05.04
ProCurve 4-Port Mini-GBIC Module
J4878A
E.05.04
ProCurve 24-Port 10/100-TX Module
J4820A
E.05.04
ProCurve 4-Port 100/1000-T Module
J4821A
E.05.04
ProCurve Redundant Power Supply (RPS)
J4839A
E.05.04
8
Software Management
OS/Web/Java Compatibility Table
OS/Web/Java Compatibility Table
The switch web agent supports the following combinations of OS browsers and Java Virtual
Machines:
Operating System
Internet Explorer
Windows NT 4.0 SP6a
5.00, 5.01
5.01, SP1
6.0, SP1
Windows 2000 Pro SP4
5.05, SP2
6.0, SP1
Windows XP Pro SP2
6.0, SP1
Windows Server SE 2003 SP1 6.0, SP1
9
Java
Sun Java 2 Runtime Environment:
– Version 1.3.1.12
– Version 1.4.2.05
Sun Java 2 Runtime Environment:
– Version 1.5.0.02
Support Notes
OS/Web/Java Compatibility Table
Support Notes
Caution: Start-up Config File Compatibility
The startup-config file saved under version E.10.xx or greater is backward-compatible with version
E.08.xx, but is NOT backward-compatible with E.07.xx or earlier software versions. Users are advised
to save a copy of any pre-E.08.xx startup-config file BEFORE UPGRADING to E.08.xx or greater, in
case there is ever a need to revert to pre-E.08.xx software. For instructions on copying the startupconfig file, see Appendix A in the Management and Configuration Guide, available on the ProCurve
Networking Web site: http:\\www.procurve.com. Click on Technical Support, then Product Manuals.
FEC, CDP Removal
Starting with Software version E.10.09, FEC trunks (Cisco Systems’ FastEtherChannel for aggregated
links) are no longer supported, and generation of CDP (Cisco Discovery Protocol) packets are no
longer supported. In their place are IEEE standards based LACP aggregated links (as well as statically
configured trunks) and generation of LLDP packets for device discovery. For more information,
please see:
ftp://ftp.hp.com/pub/networking/software/LLDP-and-LACP-statement.pdf.
10
Enforcing Switch Security
Switch Management Access Security
Enforcing Switch Security
ProCurve switches are designed as “plug and play” devices, allowing quick and easy installation in
your network. However, when preparing the switch for network operation, ProCurve strongly
recommends that you enforce a security policy to help ensure that the ease in getting started is not
used by unauthorized persons as an opportunity for access and possible malicious actions. Since
security incidents can originate with sources inside as well as outside of an organization, your switch
and network access security provisions must protect against internal and external threats while
preserving the necessary network access for authorized clients and uses.
This section provides an overview of switch management and network access security features and
applications. However, the features and applications supported by your switch depend on your
particular switch model. For information on specific features supported, refer to the software
manuals provided for your switch model.
Caution:
In its default configuration, the switch is open to unauthorized access of various types. ProCurve
recommends that you review this section to help ensure that you recognize the potential for
unauthorized switch and network access and are aware of the features available to help prevent such
access.
Switch Management Access Security
This section outlines provisions for protecting access to the switch’s status information configuration
settings. For more detailed information on these features, refer to the indicated manuals.
Default Settings Affecting Security
In the default configuration, switch management access is available through the following methods:
■
Telnet
■
Web-browser interface (including the ability to launch Telnet access)
■
SNMP access
■
Front-Panel access (serial port access to the console, plus resets and clearing the
password(s) or current configuration)
11
Enforcing Switch Security
Switch Management Access Security
It is important to evaluate the level of management access vulnerability existing in your network and
take steps to ensure that all reasonable security precautions are in place. This includes both
configurable security options and physical access to the switch hardware.
Local Manager Password
In the default configuration, there is no password protection. Configuring a local Manager password
is a fundamental step in reducing the possibility of unauthorized access through the switch’s web
browser and console (CLI and Menu) interfaces. The Manager password can easily be set using the
CLI password manager command, the Menu interface Console Passwords option, or the password
options under the Security tab in the web browser interface.
Inbound Telnet Access and Web Browser Access
The default remote management protocols enabled on the switch, such as Telnet or HTTP, are plain
text protocols, which transfer passwords in open or plain text that is easily captured. To reduce the
chances of unauthorized users capturing your passwords, secure and encrypted protocols such as
SSH and SSL must be used for remote access. This enables you to employ increased access security
while still retaining remote client access.
■
SSHv2 provides Telnet-like connections through encrypted and authenticated transactions
■
SSLv3/TLSv1 provides remote web browser access to the switch via encrypted paths
between the switch and management station clients capable of SSL/TLS operation.
(For information on SSH and SSL/TLS, refer to the chapters on these topics in the Access Security
Guide for your switch.)
Also, access security on the switch is incomplete without disabling Telnet and the standard web
browser access.Among the methods for blocking unauthorized access attempts using Telnet or the
Web browser are the following two commands:
■
no telnet-server: This CLI command blocks inbound Telnet access.
■
no web-management: This CLI command prevents use of the web browser interface through
http (port 80) server access.
If you choose not to disable Telnet and web browser access, you may want to consider using RADIUS
accounting to maintain a record of password-protected access to the switch. Refer to the chapter
titled “RADIUS Authentication and Accounting” in the Access Security Guide for your switch.
Secure File Transfers
Secure Copy and SFTP provide a secure alternative to TFTP and auto-TFTP for transferring sensitive
information such as configuration files and log information between the switch and other devices.
For more on these features, refer to the section titled “Using Secure Copy and SFTP” in the “File
Transfers” appendix of the Management and Configuration Guide for your switch.
12
Enforcing Switch Security
Switch Management Access Security
SNMP Access (Simple Network Management Protocol)
In the default configuration, the switch is open to access by management stations running SNMP
management applications capable of viewing or changing usernames, passwords, configuration, and
status data in the switch’s MIB (Management Information Base). Thus, controlling SNMP access to
the switch and preventing unauthorized SNMP access should be a key element of your network
security strategy.
General SNMP Access to the Switch. The switch supports SNMP versions 1, 2c, and 3, including
SNMP community and trap configuration. The default configuration supports versions 1 and 2c
compatibility, which uses plain text and does not provide security options. ProCurve recommends
that you enable SNMP version 3 for improved security. SNMPv3 includes the ability to configure
restricted access and to block all non-version 3 messages (which blocks version 1 and 2c unprotected
operation). SNMPv3 security options include:
•
configuring device communities as a means for excluding management access by
unauthorized stations
•
configuring for access authentication and privacy
•
reporting events to the switch CLI and to SNMP trap receivers
•
restricting non-SNMPv3 agents to either read-only access or no access
•
co-existing with SNMPv1 and v2c if necessary
For more on SNMPV3, refer to the next subsection and to the chapter titled “Configuring for Network
Management Applications” in the Management and Configuration Guide for your switch.
SNMP Access to the Switch’s Local Username and Password Authentication MIB Objects.
A management station running an SNMP networked device management application such as
ProCurve Manager Plus (PCM+) or HP OpenView can access the switch’s management information
base (MIB) for write access to the switch’s local username and password configuration. In earlier
software versions, SNMP access to the switch’s local authentication configuration (hpSwitchAuth)
MIB objects was not allowed. However, beginning with software release H.10.32, the switch’s default
configuration allows SNMP access to the local username and password MIB objects in hpSwitchAuth.
If SNMP access to these MIB objects is considered a security risk in your network, then you should
implement the following security precautions when downloading and booting from software release
H.10.32 or greater:
1.
If SNMP write access to the switch’s local username and password authentication configuration
(hpSwitchAuth) MIB (described above and in the section titled “Using SNMP To View and
Configure Switch Authentication Features” on page 77) is not desirable for your network, then
immediately after downloading and booting from the H.10.32 or greater software for the first
time, use the following CLI command to disable this feature:
snmp-server mib hpswitchauthmib excluded
13
Enforcing Switch Security
Switch Management Access Security
N o t e o n S N MP A c c e s s t o L o c a l A ut h e nt i c a t i o n M I B O b j ec t s
Downloading and booting from the H.10.32 or greater software version for the first time enables
SNMP access to the switch’s local authentication configuration MIB objects (the default action). If
SNMPv3 and other security safeguards are not in place, the local username and password MIB objects
are exposed to unprotected SNMP access and you should use the preceding command to disable this
access.
2.
If you choose to leave the local authentication configuration MIB objects accessible, then you
should do the following to help ensure that unauthorized workstations cannot use SNMP tools
to change the settings:
•
Configure SNMP version 3 management and access security on the switch.
•
Disable SNMP version 2c on the switch.
Refer to “Using SNMP Tools To Manage the Switch” in the chapter titled “Configuring for Network
Management Applications” in the Management and Configuration Guide for your switch.
Front-Panel Access and Physical Security
Physical access to the switch allows the following:
■
use of the console serial port (CLI and Menu interface) for viewing and changing the current
configuration and for reading status, statistics, and log messages.
■
use of the switch’s Clear and Reset buttons for these actions:
•
clearing (removing) local password protection
•
rebooting the switch
•
restoring the switch to the factory default configuration (and erasing any non-default
configuration settings)
Keeping the switch in a locked wiring closet or other secure space helps to prevent unauthorized
physical access. As additional precautions, you can do the following:
■
Disable or re-enable the password-clearing function of the Clear button.
■
Configure the Clear button to reboot the switch after clearing any local usernames and
passwords.
■
Modify the operation of the Reset+Clear button combination so that the switch reboots, but
does not restore the switch’s factory default settings.
■
Disable or re-enable password recovery.
14
Enforcing Switch Security
Network Security Features
For the commands to implement the above actions, refer to “Front-Panel Security” in the chapter
titled “Configuring Username and Password Security” in the Access Security Guide for your switch.
Other Provisions for Management Access Security
Authorized IP Managers. This feature uses IP addresses and masks to determine whether to allow
management access to the switch through the network, and covers access through the following:
■
Telnet and other terminal emulation applications
■
The switch’s Web browser interface
■
SNMP (with a correct community name)
Refer to the chapter titled “Using Authorized IP Managers” in the Access Security Guide for your
switch.
Secure Management VLAN. This feature creates an isolated network for managing the ProCurve
switches that offer this feature. When a secure management VLAN is enabled, CLI, Menu interface,
and web browser interface access is restricted to ports configured as members of the VLAN.
Refer to the chapter titled “Static Virtual LANs (VLANs)” in the Advanced Traffic Management Guide
for your switch.
RADIUS Authentication. For each authorized client, RADIUS can be used to authenticate operator
or manager access privileges on the switch via the serial port (CLI and Menu interface), Telnet, SSH,
and Secure FTP/Secure Copy (SFTP/SCP) access methods.
Refer to the chapter titled “RADIUS Authentication and Accounting” in the Access Security Guide
for your switch.
TACACS+ Authentication. This application uses a central server to allow or deny access to
TACACS-aware devices in your network. TACACS+ uses username/password sets with associated
privilege levels to grant or deny access through either the switch’s serial (console) port or remotely,
with Telnet. If the switch fails to connect to a TACACS+ server for the necessary authentication
service, it defaults to its own locally configured passwords for authentication control. TACACS+
allows both login (read-only) and enable (read/write) privilege level access.
Refer to the chapter titled “TACACS+ Authentication” in the Access Security Guide for your switch
model.
Network Security Features
This section outlines provisions for protecting access through the switch to the network. For more
detailed information on these features, refer to the indicated manuals.
15
Enforcing Switch Security
Network Security Features
Web and MAC Authentication
These options are designed for application on the edge of a network to provide port-based security
measures for protecting private networks and the switch itself from unauthorized access. Because
neither method requires clients to run any special supplicant software, both are suitable for legacy
systems and temporary access situations where introducing supplicant software is not an attractive
option. Both methods rely on using a RADIUS server for authentication. This simplifies access
security management by allowing you to control access from a master database in a single server. It
also means the same credentials can be used for authentication, regardless of which switch or switch
port is the current access point into the LAN. Web authentication uses a web page login to
authenticate users for access to the network. MAC authentication grants access to a secure network
by authenticating device MAC address for access to the network.
Refer to the “Web and MAC Authentication” chapter in the Access Security Guide for your switch
model.
Secure Shell (SSH)
SSH provides Telnet-like functions through encrypted, authenticated transactions of the following
types:
■
client public-key authentication: uses one or more public keys (from clients) that must
be stored on the switch. Only a client with a private key that matches a stored public key
can gain access to the switch.
■
switch SSH and user password authentication: this option is a subset of the client publickey authentication, and is used if the switch has SSH enabled without a login access
configured to authenticate the client’s key. In this case, the switch authenticates itself to
clients, and users on SSH clients then authenticate themselves to the switch by providing
passwords stored on a RADIUS or TACACS+ server, or locally on the switch.
■
secure copy (SC) and secure FTP (SFTP): By opening a secure, encrypted SSH session,
you can take advantage of SC and SFTP to provide a secure alternative to TFTP for
transferring sensitive switch information.
Refer to the chapter titled “Configuring Secure Shell (SSH)” in the Access Security Guide for your
switch model. For more on SC and SFTP, refer to the section titled “Using Secure Copy and SFTP”
in the “File Transfers” appendix of the Management and Configuration Guide for your switch model.
Secure Socket Layer (SSLv3/TLSv1)
This feature includes use of Transport Layer Security (TLSv1) to provide remote web access to the
switch via authenticated transactions and encrypted paths between the switch and management
station clients capable of SSL/TLS operation. The authenticated type includes server certificate
authentication with user password authentication.
16
Enforcing Switch Security
Network Security Features
Refer to the chapter titled “Configuring Secure Socket Layer (SSL)” in the Access Security Guide for
your switch model.
Traffic/Security Filters
These statically configured filters enhance in-band security (and improve control over access to
network resources) by forwarding or dropping inbound network traffic according to the configured
criteria. Filter options and the devices that support them are listed in the following table:
Switch Model
Source-Port
Filters
Protocol
Filters
Multicast
Filters
Series 6400cl
X
--
--
Series 5400zl
X
X
X
Series 5300xl
X
X
X
Series 4200vl
X
--
--
Series 3500yl
X
X
X
Series 3400cl
X
--
--
Series 2800
X
--
--
Series 2600
X
--
--
■
source-port filters: Inbound traffic from a designated, physical source-port will be
forwarded or dropped on a per-port (destination) basis.
■
multicast filters: Inbound traffic having a specified multicast MAC address will be
forwarded to outbound ports or dropped on a per-port (destination) basis.
■
protocol filters: Inbound traffic having the selected frame (protocol) type will be forwarded
or dropped on a per-port (destination) basis.
Refer to the “Traffic/Security Filters” chapter in the Access Security Guide for your switch model.
802.1X Access Control
This feature provides port-based or user-based (client-based) authentication through a RADIUS
server to protect the switch from unauthorized access and to enable the use of RADIUS-based user
profiles to control client access to network services. Included in the general features are the
following:
■
user-based access control supporting multiple authenticated clients per-port
■
port-based access control allowing authentication by a single client to open the port
17
Enforcing Switch Security
Network Security Features
■
switch operation as a supplicant for point-to-point connections to other 802.1X-aware
switches
The following table shows the type of access control available on the various ProCurve switch
models:
Access Control Types
6200yl 5400zl 3500yl
5300xl
4200vl
3400cl
6400cl
2800
4100gl
2600
2600-pwr
user-based access control
(multiple authenticated clients per port)
X
X1
--
X2,3
--
port-based access control
(one authenticated client opens the port)
X
X
X
X
X
switch operation as a supplicant
X
X
X
X
X
1 5300xl switches with software release E.09.02 and greater support up to 32 authenticated clients per port.
2 2800 series switches with software release I.10.20 or greater support up to 8 authenticated clients per port.
3 2600 and 2600-PWR series switches with software release H.10.20 and greater support up to 8 authenticated
clients per port.
For more information, refer to the chapter titled “Configuring Port-Based Access Control” or
“Configuring Port-Based and Client-Based Access Control” in the Access Security Guide for your
switch model.
For more information on 802.1X operation, refer to the Access Security Guide for your switch model.
Port Security, MAC Lockdown, MAC Lockout, and IP Lockdown
These features provide device-based access security in the following ways:
■
port security: Enables configuration of each switch port with a unique list of the MAC
addresses of devices that are authorized to access the network through that port. This
enables individual ports to detect, prevent, and log attempts by unauthorized devices to
communicate through the switch. Some switch models also include eavesdrop prevention
in the port security feature.
■
MAC lockdown: This “static addressing” feature is used as an alternative to port security
for to prevent station movement and MAC address “hijacking” by allowing a given MAC
address to use only one assigned port on the switch. MAC lockdown also restricts the client
device to a specific VLAN.
■
MAC lockout: This feature enables blocking of a specific MAC address so that the switch
drops all traffic to or from the specified address.
18
Enforcing Switch Security
Network Security Features
■
IP lockdown: Available on Series 2600 and 2800 switches only, this feature enables
restriction of incoming traffic on a port to a specific IP address/subnet, and denies all other
traffic on that port.
Precedence of Security Options. Where the switch is running multiple security options, it implements network traffic security based on the OSI (Open Systems Interconnection model) precedence
of the individual options, from the lowest to the highest. The following list shows the order in which
the switch implements configured security features on traffic moving through a given port.
1.
Disabled/Enabled physical port
2.
MAC lockout (Applies to all ports on the switch.)
3.
MAC lockdown
4.
Port security
5.
Authorized IP Managers
6.
Application features at higher levels in the OSI model, such as SSH.
For further information, refer to the chapter titled “Configuring and Monitoring Port Security” in the
Access Security Guide for your switch model.
Identity-Driven Manager (IDM)
IDM is a plug-in to ProCurve Manager Plus (PCM+) and uses RADIUS-based technologies to create
a user-centric approach to network access management and network activity tracking and monitoring. IDM enables control of access security policy from a central management server, with policy
enforcement to the network edge, and protection against both external and internal threats.
Using IDM, a system administrator can configure automatic and dynamic security to operate at the
network edge when a user connects to the network. This operation enables the network to distinguish
among different users and what each is authorized to do. Guest access can also be configured without
compromising internal security. This means that users can be identified and either approved or denied
at the edge of the network instead of in the core.
Criteria for enforcing RADIUS-based security for IDM applications includes classifiers such as:
■
authorized user identity
■
authorized device identity (MAC address)
■
software running on the device
■
physical location in the network
■
time of day
19
Enforcing Switch Security
Network Security Features
Responses can be configured to support the networking requirements, user (SNMP) community,
service needs, and access security level for a given client and device.
For more information on IDM, visit the ProCurve web site at http://www.procurve.com and click on
Products and Solutions, then the Network management tab, and select the Identity Driven Management
software.
20
Clarifications
HP Security Policy and Release Notes
Clarifications
HP Security Policy and Release Notes
Per HP policy, a Security Bulletin must be the first published notification of a security defect. Fixes
to security defects are not documented in release notes, also by HP policy.
The official communication for security defect fixes will always be through HP Security Bulletins.
For more information on security bulletins, and information on how to subscribe to them, please see
http://www.procurve.com/docs/security/ProCurve_Finding_SecurityNote&Bulletins_US.pdf.
Visit the ProCurve Web site for more information on security and ProCurve products:
http://www.procurve.com/customercare/support/security/index.aspx.
LLDP and LACP
Starting with Software version E.10.10, FEC trunks (Cisco Systems’ FastEtherChannel for aggregated
links) are no longer supported, and generation of CDP (Cisco Discovery Protocol) packets are no
longer supported. In their place are IEEE standards-based LACP aggregated links (as well as statically
configured trunks) and generation of LLDP packets for device discovery.
For more information, please see: ftp://ftp.hp.com/pub/networking/software/LLDP-and-LACP-statement.pdf.
Non-Genuine Mini-GBIC Detection and Protection Initiative
Non-genuine ProCurve Transceivers and Mini-GBICs have been offered for sale in the marketplace.
To protect customer networks from these unsupported products, starting with release E.09.22,
ProCurve switch software includes the capability to detect and disable non-genuine transceivers and
mini-GBICs discovered in Series 5300xl Switch ports. When a non-genuine device is discovered, the
switch disables the port and generates an error message in the Event Log.
Mesh Design Optimization
Mesh performance can be enhanced by using mesh designs that are as small and compact as possible
while still meeting the network design requirements. The following are limits on the design of meshes
and have not changed:
1.
Any switch in the mesh can have up to 24 meshed ports.
2.
A mesh domain can contain up to 12 switches.
3.
Up to 5 inter-switch meshed hops are allowed in the path connecting two nodes.
21
Clarifications
General Switch Traffic Security Guideline
4.
A fully interconnected mesh domain can contain up to 5 switches.
Mesh performance can be optimized by keeping the number of switches and the number of possible
paths between any two nodes as small as possible. As mesh complexity grows, the overhead
associated with dynamically calculating and updating the cost of all of the possible paths between
nodes grows exponentially. Cost discovery packets are sent out by each switch in the mesh every 30
seconds and are flooded to all mesh ports. Return packets include a cost metric based on inbound
and outbound queue depth, port speed, number of dropped packets, etc. Also, as mesh complexity
grows, the number of hops over which a downed link has to be reported may increase, thereby
increasing the re-convergence time.
The simplest design is the two-tier design because the number of possible paths between any two
nodes is kept low and any bad link would have to be communicated only to it's neighbor switch.
As shown here, meshing
allows multiple redundant
links between switches in the
domain, and more than one
link is allowed between any
two switches in the domain.
Switch 2
Switch 1
Note also that a switch can
have up to 24 ports configured
for meshing.
Switch 3
Switch 4
Switch 5
Switch 6
Switch 7
Switch 8
Figure 1. Example of a Two-Tier Mesh Design
Other factors affecting the performance of mesh networks include the number of destination
addresses that have to be maintained, and the overall traffic levels and patterns. However a
conservative approach when designing new mesh implementations is to use the two-tier design and
limit the mesh domain to eight switches where possible.
For more information, refer to the chapter titled “Switch Meshing” in the Advanced Traffic Management Guide for your switch.
General Switch Traffic Security Guideline
Where the switch is running multiple security options, it implements network traffic security based
on the OSI (Open Systems Interconnection model) precedence of the individual options, from the
lowest to the highest. The following list shows the order in which the switch implements configured
security features on traffic moving through a given port.
22
Clarifications
The Management VLAN IP Address
1.
Disabled/Enabled physical port
2.
MAC lockout (Applies to all ports on the switch.)
3.
MAC Lockdown
4.
Port security
5.
Authorized IP Managers
6.
Application features at higher levels in the OSI model, such as SSH.
(The above list does not address the mutually exclusive relationship that exists among some security
features.)
The Management VLAN IP Address
The optional Management VLAN, if used, must be configured with a manual IP address. It does not
operate with DHCP/Bootp configured for the IP address.
Heavy Memory Usage with PIM-DM
Heavy use of PIM (Many S/G--source-group--flows over many VLANs) combined with other memoryintensive features, can oversubscribe memory resources and impact overall performance. If available
memory is exceeded, the switch drops any new multicast flows, and generates appropriate log
messages. Corrective actions can include reducing the number of VLANs on the 5300xl device by
moving some VLANs to another device, free up system resources by disabling another, non-PIM
feature, and/or moving some hosts to another device. For more information, refer to “Operating
Notes” and “Messages Related to PIM Operation” in the chapter titled “PIM DM (Dense Mode)” in the
Advanced Traffic Management Guide (February, 2004 or later) for the ProCurve Series 5300xl
switches. For more information on PIM-DM operation, refer to the chapter titled “PIM-DM (Dense
Mode)” in the Advanced Traffic Management Guide for the ProCurve Series 5300xl switches. (To
download switch documentation for software release E.09.xx, refer to “Software Updates” on page 1.)
Change in QoS Priority and Policy Limit
Beginning with software release E.09.22, the switch allows configuration of up to 250 priority and/
or DSCP policy configurations. Attempting to add more than 250 entries generates an error message
in the CLI.
Heavy use of QoS, combined with other memory-intensive features, can oversubscribe memory
resources and impact overall performance. Updating the switch software from an earlier release in
which more than 250 entries were configured causes the switch to drop any entries in excess of the
first 250 and to generate an event log message indicating this action. For more information, refer to
“QoS Operating Notes” in the chapter titled “Quality of Service (QoS): Managing Bandwidth More
23
Clarifications
Inter-operating with 802.1s Multiple Spanning-Tree
Effectively” in the Advanced Traffic Management Guide for the ProCurve Series 5300xl switches
(part number 5990-6051, January 2005 or later). Note that the above limit supersedes the limit
indicated in the January 2005 edition of the Advanced Traffic Management Guide. To download
switch documentation for software release E.09.22, refer to “Software Updates” on page 1.
Inter-operating with 802.1s Multiple Spanning-Tree
The ProCurve implementation of Multiple Spanning-Tree (MSTP) in software release E.08.xx and
greater complies with the IEEE 802.1s standard and inter-operates with other devices running
compliant versions of 802.1s. Note that the ProCurve Series 9300 routing switches do not offer 802.1scompliant MSTP. Thus, to support a connection between a 9300 routing switch and a 5300xl switch
running MSTP, configure the 9300 with either 802.1D (STP) or 802.1w (RSTP). For more information
on this topic, refer to the chapter titled “Spanning-Tree Operation” in the Advanced Traffic Management Guide (part number 5990-6051, January 2005 or later). (To download switch documentation
for software release E.09.22, refer to “Software Updates” on page 1.)
Rate-Limiting
The configured rate limit on a port reflects the permitted forwarding rate from the port to the switch
backplane, and is visible as the average rate of the outbound traffic originating from the rate-limited
port. (The most accurate rate-limiting is achieved when using standard 64-byte packet sizes.) Also,
rate-limiting reflects the available percentage of a port’s entire inbound bandwidth. The rate of
inbound flow for traffic of a given priority and the rate of flow from a rate-limited port to a particular
queue of an outbound port are not measures of the actual rate limit enforced on a port. Also, ratelimiting is byte-based and is applied to the available bandwidth on a port, and not to any specific
applications running through the port. If the total bandwidth requested by all applications together
is less than the available, configured maximum rate, then no rate-limit can be applied. This situation
occurs with a number of popular throughput-testing software applications, as well as most regular
network applications.
As a performance consideration, implementing rate-limiting in heavy traffic situations involving QoS,
can affect overall performance. For more information on rate-limiting operation, refer to “Operating
Notes for Rate-Limiting” in the chapter titled “Optimizing Traffic Flow with Port Controls, Port
Trunking, and Filters” of the Management and Configuration Guide (part number 5990-6050, January
2005 or later) for the ProCurve Series 5300xl switches. (To download switch documentation for
software release E.09.22, refer to “Software Updates” on page 1.)
Time Zone Offset
Starting with release E.05.xx, the method of configuring the Time Zone for TimeP or SNTP configuration has been updated. Previous switch software for all ProCurve switches used positive time offset
values for time zones that are West of GMT and negative values for time zones that are East of GMT.
24
Clarifications
Time Zone Offset
The standards indicate that time zones West of GMT should be designated by negative offset values,
and time zones East of GMT by positive values. Software version E.05.xx updates this configuration
method, but if you use the same values for indicating time zones as you did for previous ProCurve
switches, the time will be set incorrectly on your Series 5300GL switch. For example, for previous
ProCurve switches, the US Pacific time zone was configured by entering +480. With software version
E.05.xx, the US Pacific time zone must now be configured by entering -480.
25
Known Issues
Time Zone Offset
Known Issues
Release E.11.02
The following problem is a known issue in release E.11.02 or newer.
■
STP (no PR) — If a pre-E.11.xx configuration has forced function to STP (802.1d), via the
command spanning-tree protocol-version STP-compatible and trunks are configured; the
following symptoms may be seen after the update to E.11.xx.
•
Priority of the trunks fails to get appropriately translated
•
After a reboot, the switch reports that a change in spanning tree configuration has been
made, and recommends a write mem and reload. Performing a write mem and reload
does not help.
•
There may be reporting issues with show span detail
26
Enhancements
Release E.10.03 through E.10.23 Enhancements
Enhancements
Unless otherwise noted, each new release includes the features added in all previous releases.
Enhancements are listed in chronological order, oldest to newest software release.
Descriptions and instructions for enhancements included in Release E.10.02 or earlier are included
in the latest release of manuals for the ProCurve 5300xl switches (Oct. 2005), available on the web
at http://www.hp.com/rnd/support/manuals/5300xl.htm
Release E.10.03 through E.10.23 Enhancements
Software fixes only; no new enhancements. (Never built).
Release E.10.24 Enhancements
CLI Port Rate Display
Beginning with release E.10.24 the CLI show interface [port list] command includes the port rate in
the display. The rate displayed is the average for a period of 5 minutes, given in bps for 1G ports, or
in Kbps for 10G ports. You can also use the CLI command: show interface port-utilization to display
port-rate over a period of 5 minutes.
Releases E.10.25 and E.10.26 Enhancements
Software fixes only; no new enhancements.
Release E.10.27 Enhancements
MSTP Default Path Cost Controls
Summary: 802.1D and 802.1t specify different default path-cost values (based on interface speed).
These are used if the user hasn't configured a “custom” path-cost for the interface. The default of this
toggle is to use 802.1t values. The reason one might set this control to 802.1D would be for better
interoperability with legacy 802.1D STP (Spanning Tree Protocol) bridges.
To support legacy STP bridges, the following commands (options) have been added to the CLI:
27
Enhancements
Release E.10.28 through E.10.29 Enhancements
spanning-tree legacy-path-cost - Use 802.1D values for default path-cost
no spanning-tree legacy-path-cost - Use 802.1t values for default path-cost
The “legacy-path-cost” CLI command does not affect or replace functionality of the “spanningtree force-version” command. The “spanning-tree force-version” controls whether MSTP will
send and process 802.1w RSTP, or 802.1D STP BPDUs. Regardless of what the “legacy-path-cost”
parameter is set to, MSTP will inter-operate with legacy STP bridges (send/receive Config and
TCN BPDUs).
spanning-tree legacy-mode - A “macro” that is the equivalent of executing the “spanning-tree
legacy-path-cost” and “spanning-tree force-version stp-compatible” commands.
no spanning-tree legacy-mode - A “macro” that is the equivalent of executing the “no spanningtree legacy-path-cost” and “spanning-tree force-version mstp-compatible” commands.
When either legacy-mode or legacy-path-cost control is toggled, all default path costs will be
recalculated to correspond to the new setting, and spanning tree is recalculated if needed.
Release E.10.28 through E.10.29 Enhancements
Software fixes only; no new enhancements.
Release E.10.30 Enhancements
Release E.10.31 includes the following enhancement:
■
Added support for J9001A and J9003A wireless xl modules.
Release E.10.31 Enhancements
Release E.10.31 includes the following enhancement:
■
Added the show tech transceivers command to allow removable transceiver serial
numbers to be read without removal of the transceivers from the switch
28
Enhancements
Release E.10.32 Enhancements
Release E.10.32 Enhancements
Release E.10.32 includes the following enhancements:
■
Added DHCP Option 82 functionality for 5300xl series.
■
Support for Fast Boot CLI & SNMP implementation
Using Fastboot To Reduce Boot Time
The fastboot command allows a boot sequence that skips the internal power-on self-tests, resulting
in a faster boot time.
Syntax:
[no] fastboot
Used in the global configuration mode to enable the fastboot
option. The no version of the command disables fastboot
operation.
Syntax:
show fastboot
Shows the status of the fastboot feature, either enabled or
disabled.
For example:
ProCurve(config)# show fastboot
Fast Boot:
Disabled
DHCP Option 82: Using the Management VLAN IP Address for the Remote ID
This section describes the Management VLAN enhancement to the DHCP option 82 feature. For more
information on DHCP option 82 operation, refer to “Configuring DHCP Relay” in the chapter titled
“IP Routing Features” in the Advanced Traffic Management Guide.
When the routing switch is used as a DHCP relay agent with Option 82 enabled, it inserts a relay agent
information option into client-originated DHCP packets being forwarded to a DHCP server. The
option automatically includes two suboptions:
■
Circuit ID: the identity of the port through which the DHCP request entered the relay agent
■
Remote ID: the identity (IP address) of the DHCP relay agent
29
Enhancements
Release E.10.32 Enhancements
Using earlier software releases, the remote ID can be either the routing switch’s MAC address (the
default option) or the IP address of the VLAN or subnet on which the client DHCP request was
received. Beginning with software release M.08.xx, if a Management VLAN is configured on the
routing switch, then the Management VLAN IP address can be used as the remote ID.
Syntax: dhcp-relay option 82 < append | replace | drop > [validate] [ip | mac | mgmt-vlan]
[ip | mac | mgmt-vlan]: Specifies the remote ID suboption the routing switch will use in
Option 82 fields added or appended to DHCP client packets. The choice depends on
how you want to define DHCP policy areas in the client requests sent to the DHCP
server. If a remote ID suboption is not configured, then the routing switch defaults
to the mac option.
mgmt-vlan: Specifies the IP address of the (optional) Management VLAN configured
on the routing switch. Requires that a Management VLAN is already configured on
the switch. If the Management VLAN is multinetted, then the primary IP address
configured for the Management VLAN is used for the remote ID.
ip: Specifies the IP address of the VLAN on which the client DHCP packet enters the
routing switch. In the case of a multinetted VLAN, the remote ID suboption uses the
IP address of the subnet on which the client request packet is received.
mac: Specifies the routing switch’s MAC address. (The MAC address used is the same
MAC address that is assigned to all VLANs configured on the routing switch.)
(Default: mac)
Example
In the routing switch in figure 1, option 82 has been configured with mgmt-vlan for the Remote ID.
ProCurve(config)# dhcp-relay option 82 append mgmt-vlan
Routing Switch
Management VLAN
VLAN 300
10.39.10.1 (secondary IP)
DHCP Server “A”
Client “X”
10.38.10.1 (primary IP)
VLAN 200
DHCP Server “B”
10.29.10.1
DHCP Server “C”
10.28.10.1
VLAN 100
10.15.10.1
Client “Y”
Client “Z”
On a routing switch that is
the primary DHCP relay
agent for a given client, if
the (optional) Management
VLAN is selected as the
Remote ID suboption and is
also multinetted, then the
Remote ID for the client
DHCP requests is the
primary IP address of the
Management VLAN.
Figure 2. DHCP Option 82 When Using the Management VLAN as the Remote ID Suboption
30
Enhancements
Release E.10.33 Enhancements
The resulting effect on DHCP operation for clients X, Y, and Z is shown in table 1.
Table 1. DHCP Operation for the Topology in Figure 2
Client
Remote ID
giaddr*
DHCP
Server
X
10.38.10.1
10.39.10.1
A only
If a DHCP client is in the Management VLAN, then its DHCP requests
can go only to a DHCP server that is also in the Management VLAN.
Routing to other VLANs is not allowed.
Y
10.38.10.1
10.29.10.1
B or C
Z
10.38.10.1
10.15.10.1
B or C
Clients outside of the Management VLAN can send DHCP requests
only to DHCP servers outside of the Management VLAN. Routing to
the Management VLAN is not allowed.
*The IP address of the primary DHCP relay agent receiving a client request packet is automatically added to the packet,
and is identified as the giaddr (gateway interface address). This is the IP address of the VLAN on which the request
packet was received from the client. For more information, refer to RFC 2131 and RFC 3046.
Operating Notes
■
Routing is not allowed between the Management VLAN and other VLANs. Thus, a DHCP
server must be available in the Management VLAN if there are clients in the Management
VLAN that require a DHCP server.
■
If the Management VLAN IP address configuration changes after mgmt-vlan has been configured as the remote ID suboption, the routing switch dynamically adjusts to the new IP
addressing for all future DHCP requests.
■
The Management VLAN and all other VLANs on the routing switch use the same MAC address.
Release E.10.33 Enhancements
Release E.10.33 includes the following enhancements:
■
Enhancement (PR_1000330704) — Added RADIUS Command Authorization and
Accounting for the Command Line Interface (CLI).
Releases E.10.34 through E.10.35 Enhancements
Software fixes only, no new enhancements.
31
Enhancements
Release E.10.36 Enhancements
Release E.10.36 Enhancements
Release E.10.36 includes the following enhancements:
SFlow Show Commands
In earlier software releases, the only method for checking whether sFlow is enabled on the switch
was via an SNMP request. Beginning with software release E.10.36, the 5300xl switches have added
the following show sFlow commands that allow you to see sFlow status via the CLI.
Syntax: show sflow agent
Displays sFlow agent information. The agent address is normally the ip address of
the first vlan configured.
Syntax: show sflow destination
Displays information about the management station to which the sFlow samplingpolling data is sent.
Syntax: show sflow sampling-polling <port-list/range>
Displays status information about sFlow sampling and polling.
Syntax: show sflow all
Displays sFlow agent, destination, and sampling-polling status information for all
the ports on the switch.
Terminology
sFlow — An industry standard sampling technology, defined by RFC 3176, used to continuously
monitor traffic flows on all ports providing network-wide visibility into the use of the network.
sFlow agent — A software process that runs as part of the network management software within a
device. The agent packages data into datagrams that are forwarded to a central data collector.
sFlow destination — The central data collector that gathers datagrams from sFlow-enabled switch
ports on the network. The data collector decodes the packet headers and other information to
present detailed Layer 2 to Layer 7 usage statistics.
Viewing SFlow Configuration
The show sflow agent command displays read-only switch agent information. The version information
shows the sFlow MIB support and software versions; the agent address is typically the ip address of
the first VLAN configured on the switch.
32
Enhancements
Release E.10.36 Enhancements
ProCurve# show sflow agent
Version
1.3;HP;E.10.36
Agent Address
10.0.10.228
Figure 3. Viewing sFlow Agent Information
The show sflow destination command includes information about the management-station’s destination address, receiver port, and owner.
ProCurve# show sflow destination
sflow
Enabled
Datagrams Sent
221
Destination Address
10.0.10.41
Receiver Port
6343
Owner
admin
Timeout (seconds)
333
Max Datagram Size
1400
Datagram Version Support
5
Figure 4. Example of Viewing sFlow Destination Information
Note the following details:
■
Destination Address remains blank unless it has been configured on the switch via SNMP.
■
Datagrams Sent shows the number of datagrams sent by the switch agent to the management station since the switch agent was last enabled.
■
Timeout displays the number of seconds remaining before the switch agent will automatically disable sFlow (this is set by the management station and decrements with time).
■
Max Datagram Size shows the currently set value (typically a default value, but this can
also be set by the management station).
The show sflow sampling-polling command displays information about sFlow sampling and polling on
the switch. You can specify a list or range of ports for which to view sampling information.
33
Enhancements
Release E.10.36 Enhancements
ProCurve# show sflow sampling-polling 1-5
sflow destination Enabled
Port
| Sampling
Enabled
----- + ------1
| Yes
2
| No
3
| Yes
4
| Yes
5
| Yes
Rate
-------6500000
50
2000
200
20000
Header
-----128
128
100
100
128
Dropped
| Polling
Samples
| Enabled Interval
---------- + ------- -------5671234
Yes
60
0
Yes
300
24978
No
30
4294967200
Yes
40
34
Yes
500
Figure 5. Example of Viewing sFlow Sampling and Polling Information
The show sflow all command combines the outputs of the preceding three show commands including
sFlow status information for all the ports on the switch.
34
Enhancements
Release E.10.37 Enhancements
Release E.10.37 Enhancements
Release E.10.37 includes the following enhancement:
Spanning Tree Show Commands
The show spanning-tree detail command previously displayed 802.1D (STP) and 802.1w (RSTP) status
and counters for all ports on the switch. Beginning with software release E.10.37, this command
provides 802.1s (MSTP) multi-instance spanning tree details and displays additional parameters to
enhance spanning-tree reporting via the CLI.
The following shows RSTP sample output from the enhanced command.
ProCurve# show spanning-tree detail
Status and Counters - RSTP Port(s) Detailed Information
Port
Status
Role
State
Priority
Path Cost
Root Path Cost
Root Bridge ID
Designated Bridge ID
Designated Port ID
AdminEdgePort
OperEdgePort
AdminPointToPointMAC
OperPointToPointMAC
Aged BPDUs Count
Loop-back BPDUs Count
TC Detected
TC Flag Transmitted
TC Flag Received
RSTP
BPDUs Tx
---------3
RSTP
BPDUs Rx
---------0
: 1
: Up
: Root
: Forwarding
: 128
: 200000
: 10
: 1:0001e7-215e00
: 32768:0001e7-3d0080
: 128:75
: Yes
: No
: Force-True
: Yes
: 0
: 0
: 1
: 0
TC ACK Flag Transmitted : 0
: 0
TC ACK Flag Received
: 47
CFG
BPDUs Tx
---------0
Figure 6. Example of Show Spanning-Tree Detail
35
CFG
BPDUs Rx
---------256654
TCN
BPDUs Tx
---------47
TCN
BPDUs Rx
---------0
Enhancements
Release E.10.37 Enhancements
Operating Notes
■
■
■
TC refers to a Topology Change detected on the given port. Note the following details:
•
TC Detected counter shows when a port identifies a topology change (increments when
the particular non-Edge port goes into forwarding). For RSTP and MSTP, this would be
due to the switch’s link going to forwarding.
•
TC Flag Transmitted counter shows the number of TC notifications sent out of the port.
This refers to propagating a topology change that occurred on another port (that is, a
TC Detected increment) or to propagating a topology change received on another port
(that is, TC Flag Received).
•
TC Flag Received counter shows the number of TC notifications (RSTP or MSTP style
BPDU with the TC flag set) received on the port.
•
TC ACK Flag Transmitted is an 802.1D mode counter. It will only increment when the port
is operating in 802.1D mode and an 802.1D style PDU is sent out of the port.
•
TC ACK Flag Received is an 802.1D mode counter. It will only increment when the port is
operating in 802.1D mode and an 802.1D style PDU is received on the port.
With STP and RSTP activated:
•
The show spanning tree detail command shows all active RSTP port by port.
•
The show spanning-tree <port-list> detail command shows the specified port-list RSTP
port by port detail.
With MSTP activated:
•
The show spanning tree detail command shows all active MSTP port by port. This
command only gives information concerning the common spanning tree (CST) ports. To
view counters pertaining to a specific spanning-tree instance, you must use the show
spanning-tree instance <inst> detail command. The show spanning-tree <port-list> detail
command shows the specified port-list MSTP port by port detail.
•
The show spanning-tree instance <inst> detail command shows all ports active for a
specific instance of MSTP.
•
The show spanning-tree <port-list> instance <inst> detail shows the specified port-list for
the specified instance of MSTP.
•
TC ACK Flag Transmitted and TC ACK Flag Received are part of the CST counters displayed
by the show spanning tree detail command. TC Detected, TC Flag Transmitted, and TC Flag
Received are included only with the instance parameter due to the nature of MSTP.
36
Enhancements
Release E.10.38 Enhancements
Release E.10.38 Enhancements
Release E.10.38 includes the following enhancement:
■
Support for the Advanced Encryption Standard (AES) privacy protocol for SNMPv3.
Release E.10.39 Enhancements
Release E.10.39 contains software fixes only, no new enhancements.
Release E.10.40 Enhancements
Release E.10.40 includes the following enhancement:
■
If SCP or SFTP is enabled, TFTP is automatically disabled. TFTP cannot be enabled if either
SCP or SFTP are enabled.
Release E.10.41 Enhancements
Release E.10.41 contains software fixes only, no new enhancements.
Release E.10.42 Enhancements
Release E.10.42 includes the following enhancements:
■
Support for Unidirectional Fiber Break Detection. See “Uni-Directional Link Detection
(UDLD)” on page 38 for details.
■
802.1X Controlled Directions enhancement for the 5300xl switches. With this enhancement,
administrators can use “Wake-on-LAN” with computers that are connected to ports configured for 802.1X authentication. See “Configuring 802.1X Controlled Directions” on page 45.
37
Enhancements
Release E.10.42 Enhancements
Uni-Directional Link Detection (UDLD)
Uni-directional Link Detection (UDLD) monitors a link between two ProCurve switches and blocks
the ports on both ends of the link if the link fails at any point between the two devices. This feature
is particularly useful for detecting failures in fiber links and trunks. Figure 7 shows an example.
Scenario 1 (No UDLD): Without UDLD, the switch ports
remain enabled despite the link failure. Traffic continues to
be load-balanced to the ports connected to the failed link.
Scenario 2 (UDLD-enabled): When UDLD is enabled, the
feature blocks the ports connected to the failed link.
Trunk
Third Party
Switch
ProCurve
Switch
ProCurve
Switch
Link Failure
Figure 7. UDLD Example
In this example, each ProCurve switch load balances traffic across two ports in a trunk group. Without
the UDLD feature, a link failure on a link that is not directly attached to one of the ProCurve switches
remains undetected. As a result, each switch continue to send traffic on the ports connected to the
failed link. When UDLD is enabled on the trunk ports on each ProCurve switch, the switches detect
the failed link, block the ports connected to the failed link, and use the remaining ports in the trunk
group to forward the traffic.
Similarly, UDLD is effective for monitoring fiber optic links that use two uni-direction fibers to
transmit and receive packets. Without UDLD, if a fiber breaks in one direction, a fiber port may
assume the link is still good (because the other direction is operating normally) and continue to send
traffic on the connected ports. UDLD-enabled ports; however, will prevent traffic from being sent
across a bad link by blocking the ports in the event that either the individual transmitter or receiver
for that connection fails.
38
Enhancements
Release E.10.42 Enhancements
Ports enabled for UDLD exchange health-check packets once every five seconds (the link-keepalive
interval). If a port does not receive a health-check packet from the port at the other end of the link
within the keepalive interval, the port waits for four more intervals. If the port still does not receive
a health-check packet after waiting for five intervals, the port concludes that the link has failed and
blocks the UDLD-enabled port.
When a port is blocked by UDLD, the event is recorded in the switch log or via an SNMP trap (if
configured); and other port blocking protocols, like spanning tree or meshing, will not use the bad
link to load balance packets. The port will remain blocked until the link is unplugged, disabled, or
fixed. The port can also be unblocked by disabling UDLD on the port.
Configuration Considerations
■
UDLD is configured on a per-port basis and must be enabled at both ends of the link. See the
note below for a list of ProCurve switches that support UDLD.
■
To configure UDLD on a trunk group, you must configure the feature on each port of the
group individually. Configuring UDLD on a trunk group’s primary port enables the feature
on that port only.
■
Dynamic trunking is not supported. If you want to configure a trunk group that contains
ports on which UDLD is enabled, you must remove the UDLD configuration from the ports.
After you create the trunk group, you can re-add the UDLD configuration.
Note
UDLD interoperates with the following ProCurve switch series: 2600, 2800, 3400, 3500, 4200, 5300,
5400, 6200, 6400, and 9300. Consult the release notes and current manuals for required software
versions.
Configuring UDLD
The following commands allow you to configure UDLD via the CLI.
Syntax: [no] interface <port-list> link-keepalive
Enables UDLD on a port or range of ports.
To disable the feature, enter the no form of the command.
Default: UDLD disabled
Syntax: link-keepalive interval <interval>
Determines the time interval to send UDLD control packets. The <interval> parameter specifies how often the ports send a UDLD packet. You can specify from 10 –
100, in 100 ms increments, where 10 is 1 second, 11 is 1.1 seconds, and so on.
Default: 50 (5 seconds)
39
Enhancements
Release E.10.42 Enhancements
Syntax: link-keepalive retries <num>
Determines the maximum number of retries to send UDLD control packets. The
<num> parameter specifies the maximum number of times the port will try the health
check. You can specify a value from 3 – 10.
Default: 5
Syntax: [no] interface <port-list> link-keepalive vlan <vid>
Assigns a VLAN ID to a UDLD-enabled port for sending of tagged UDLD control
packets.Under default settings, untagged UDLD packets can still be transmitted and
received on tagged only ports—however, a warning message will be logged.
The no form of the command disables UDLD on the specified port(s).
Default: UDLD packets are untagged; tagged only ports will transmit and receive
untagged UDLD control packets
Enabling UDLD. UDLD is enabled on a per port basis. For example, to enable UDLD on port a1,
enter:
ProCurve(config)#interface al link-keepalive
To enable the feature on a trunk group, enter the appropriate port range. For example:
ProCurve(config)#interface al-a4 link-keepalive
Note
When at least one port is UDLD-enabled, the switch will forward out UDLD packets that arrive on
non-UDLD-configured ports out of all other non-UDLD-configured ports in the same vlan. That is,
UDLD control packets will “pass through” a port that is not configured for UDLD. However, UDLD
packets will be dropped on any blocked ports that are not configured for UDLD.
Changing the Keepalive Interval. By default, ports enabled for UDLD send a link health-check
packet once every 5 seconds. You can change the interval to a value from 10 – 100 deciseconds, where
10 is 1 second, 11 is 1.1 seconds, and so on. For example, to change the packet interval to seven
seconds, enter the following command at the global configuration level:
ProCurve(config)# link-keepalive interval 70
Changing the Keepalive Retries. By default, a port waits five seconds to receive a health-check
reply packet from the port at the other end of the link. If the port does not receive a reply, the port
tries four more times by sending up to four more health-check packets. If the port still does not receive
a reply after the maximum number of retries, the port goes down.
40
Enhancements
Release E.10.42 Enhancements
You can change the maximum number of keepalive attempts to a value from 3 – 10. For example, to
change the maximum number of attempts to 4, enter the following command at the global configuration level:
ProCurve(config)# link-keepalive retries 4
Configuring UDLD for Tagged Ports. The default implementation of UDLD sends the UDLD
control packets untagged, even across tagged ports. If an untagged UDLD packet is received by a
non-ProCurve switch, that switch may reject the packet. To avoid such an occurrence, you can
configure ports to send out UDLD control packets that are tagged with a specified VLAN.
To enable ports to receive and send UDLD control packets tagged with a specific VLAN ID, enter a
command such as the following at the interface configuration level:
ProCurve(config)#interface l link-keepalive vlan 22
Notes
■
You must configure the same VLANs that will be used for UDLD on all devices across the
network; otherwise, the UDLD link cannot be maintained.
■
If a VLAN ID is not specified, then UDLD control packets are sent out of the port as untagged
packets.
■
To re-assign a VLAN ID, re-enter the command with the new VLAN ID number. The new
command will overwrite the previous command setting.
■
When configuring UDLD for tagged ports, you may receive a warning message if there are
any inconsistencies with the port’s VLAN configuration (see page 44 for potential problems).
Viewing UDLD Information
The following show commands allow you to display UDLD configuration and status via the CLI.
Syntax: show link-keepalive
Displays all the ports that are enabled for link-keepalive.
Syntax: show link-keepalive statistics
Displays detailed statistics for the UDLD-enabled ports on the switch.
Syntax: clear link-keepalive statistics
Clears UDLD statistics. This command clears the packets sent, packets received, and
transitions counters in the show link-keepalive statistics display.
41
Enhancements
Release E.10.42 Enhancements
Displaying Summary UDLD Information. To display summary information on all UDLD-enabled
ports, enter the show link-keepalive command. For example:
ProCurve(config)# show link-keepalive
Total link-keepalive enabled ports: 4
Keepalive Retries: 3
Keepalive Interval: 1 sec
Port 1 is UDLD-enabled, and
tagged for a specific VLAN.
Port Enabled Physical Keepalive
Adjacent
UDLD
Status
Status
Switch
VLAN
------------------------------------------------------------------1
Yes
up
up
00d9d-f9b700
200
2
Yes
up
up
01560-7b1600
untagged
Port
3 is UDLD-enabled, but
3
Yes
down
off-line
has no physical connection.
4
Yes
up
failure
Port 4 is connected, but is blocked
5
No
down
off-line
due to a link-keepalive failure
Port 5 has been disabled by
the System Administrator.
Figure 8. Example of UDLD Information displayed using Show Link-Keepalive Command
42
Enhancements
Release E.10.42 Enhancements
Displaying Detailed UDLDP Status Information. To display detailed UDLD information for
specific ports, enter the show link-keepalive statistics command. For example:
Ports 1 and 2 are UDLD-enabled and show
the number of health check packets sent
and received on each port.
ProCurve(config)# show link-keepalive statistics
Port:
Current State:
Udld Packets Sent:
Udld Packets Received:
Port Blocking:
1
up
1000
1000
no
Neighbor MAC Addr:
Neighbor Port:
State Transitions:
Link-vlan:
0000a1-b1c1d1
5
2
1
Port:
Current State:
Udld Packets Sent:
Udld Packets Received:
Port Blocking:
2
up
500
450
no
Neighbor MAC Addr:
Neighbor Port:
State Transitions:
Link-vlan:
000102-030405
6
3
200
Port:
Current State:
Udld Packets Sent:
Udld Packets Received:
Port Blocking:
3
off line
0
0
no
Neighbor MAC Addr:
Neighbor Port:
State Transitions:
Link-vlan:
n/a
n/a
0 Port 4 is shown as blocked
1 due to a link-keepalive failure
Port:
Current State:
Udld Packets Sent:
Udld Packets Received:
Port Blocking:
4
failure
128
50
yes
Neighbor MAC Addr:
Neighbor Port:
State Transitions:
Link-vlan:
n/a
n/a
8
1
Figure 9. Example of Detailed UDLD Information displayed using Show Link-Keepalive Statistics Command
Clearing UDLD Statistics. To clear UDLD statistics, enter the following command:
ProCurve# clear link-keepalive statistics
This command clears the Packets sent, Packets received, and Transitions counters in the show link
keepalive statistics display (see Figure 9 for an example).
43
Enhancements
Release E.10.42 Enhancements
Configuration Warnings and Event Log Messages
Warning Messages. The following table shows the warning messages that may be issued and their
possible causes, when UDLD is configured for tagged ports.
Table 2. Warning Messages caused by configuring UDLD for Tagged Ports
CLI Command Example
Warning Message
Possible Problem
link-keepalive 6
Possible configuration
problem detected on port
6. UDLD VLAN
configuration does not
match the port's VLAN
configuration.
You have attempted to enable UDLD on a port that is
a tagged only port, but did not specify a configuration
for tagged UDLD control packets. In this example, the
switch will send and receive the UDLD control
packets untagged despite issuing this warning.
link-keepalive 7
vlan 4
Possible configuration
problem detected on port
7. UDLD VLAN
configuration does not
match the port's VLAN
configuration.
You have attempted to configure tagged UDLD
packets on a port that does not belong to the specified
VLAN. In this example, if port 7 belongs to VLAN 1 and
22, but the user tries to configure UDLD on port 7 to
send tagged packets in VLAN 4, the configuration will
be accepted. The UDLD control packets will be sent
tagged in VLAN 4, which may result in the port being
blocked by UDLD if the user does not configure VLAN
4 on this port.
no vlan 22 tagged
20
Possible configuration
problem detected on port
18. UDLD VLAN
configuration does not
match the port's VLAN
configuration.
You have attempted to remove a VLAN on port that is
configured for tagged UDLD packets on that VLAN. In
this example, if port 18, 19, and 20 are transmitting and
receiving tagged UDLD packets for Vlan 22, but the
user tries to remove Vlan 22 on port 20, the
configuration will be accepted. In this case, the UDLD
packets will still be sent on Vlan 20, which may result
in the port being blocked by UDLD if the users do not
change the UDLD configuration on this port.
Note: If you are configuring the switch via SNMP with the same problematic VLAN configuration choices, the above
warning messages will also be logged in the switch’s event log.
Event Log Messages. The following table shows the event log messages that may be generated once
UDLD has been enabled on a port.
Table 3. UDLD Event Log Messages
Message
Event
I 01/01/06 04:25:05 ports: port 4 is
deactivated due to link failure.
A UDLD-enabled port has been blocked due to part of the link
having failed.
I 01/01/06 06:00:43 ports: port 4 is
up, link status is good.
A failed link has been repaired and the UDLD-enabled port is no
longer blocked.
44
Enhancements
Release E.10.42 Enhancements
Configuring 802.1X Controlled Directions
After you enable 802.1X authentication on specified ports, you can use the aaa port-access controlleddirections command to configure how a port transmits traffic before it successfully authenticates a
client and enters the authenticated state.
As documented in the IEEE 802.1X standard, an 802.1X-aware port that is unauthenticated can
control traffic in either of the following ways:
■
In both ingress and egress directions by disabling both the reception of incoming frames and
transmission of outgoing frames
■
Only in the ingress direction by disabling only the reception of incoming frames.
Prerequisite. As documented in the IEEE 802.1X standard, the disabling of incoming traffic and
transmission of outgoing traffic on an 802.1X-aware egress port in an unauthenticated state (using
the aaa port-access controlled-directions in command) is supported only if:
■
The port is configured as an edge port in the network using the spanning-tree edge-port
command.
■
The 802.1s Multiple Spanning Tree Protocol (MSTP) or 802.1w Rapid Spanning Tree Protocol
(RSTP) is enabled on the switch. MSTP and RSTP improve resource utilization while
maintaining a loop-free network.
For information on how to configure the prerequisites for using the aaa port-access controlleddirections in command, see Chapter 4, “Multiple Instance Spanning-Tree Operation” in the Advanced
Traffic Management Guide.
Syntax:
aaa port-access <port-list > controlled-directions <both | in>
both (default): Incoming and outgoing traffic is blocked on
an 802.1X-aware port before authentication occurs.
in: Incoming traffic is blocked on an 802.1X-aware port
before authentication occurs. Outgoing traffic with
unknown destination addresses is flooded on
unauthenticated 802.1X-aware ports.
Wake-on-LAN Traffic
The Wake-on-LAN feature is used by network administrators to remotely power on a sleeping
workstation (for example, during early morning hours to perform routine maintenance operations,
such as patch management and software updates).
The aaa port-access controlled-direction in command allows Wake-on-LAN traffic to be transmitted on
an 802.1X-aware egress port that has not yet transitioned to the 802.1X authenticated state; the
controlled-direction both setting prevents Wake-on-LAN traffic to be transmitted on an 802.1X-aware
egress port until authentication occurs.
45
Enhancements
Release E.10.42 Enhancements
Note
Although the controlled-direction in setting allows Wake-on-LAN traffic to traverse the switch through
unauthenticated 802.1X-aware egress ports, it does not guarantee that the Wake-on-LAN packets will
arrive at their destination. For example, firewall rules on other network devices and VLAN rules may
prevent these packets from traversing the network.
Operating Notes
■
Using the aaa port-access controlled-directions in command, you can enable the transmission of
Wake-on-LAN traffic on unauthenticated egress ports that are configured for 802.1X .
Because a port can be configured for more than one type of authentication to protect the switch from
unauthorized access, the last setting you configure with the aaa port-access controlled-directions
command is applied to all authentication methods configured on the switch.
For information about how to configure and use MAC and Web authentication, refer to the Access
and Security Guide for your switch.
■
To display the currently configured 802.1X Controlled Directions value, enter the show portaccess authenticator config command.
■
When an 802.1X-authenticated port is configured with the controlled-directions in setting,
eavesdrop prevention is not supported on the port.
Example: Configuring 802.1X Controlled Directions
The following example shows how to enable the transmission of Wake-on-LAN traffic in the egress
direction on an 802.1X-aware port before it transitions to the 802.1X authenticated state and
successfully authenticates a client device.
ProCurve(config)#
ProCurve(config)#
ProCurve(config)#
ProCurve(config)#
aaa
aaa
aaa
aaa
port-access authenticator a10
authentication port-access eap-radius
port-access authenticator active
port-access a10 controlled-directions in
Figure 10. Example of Configuring 802.1X Controlled Directions
46
Enhancements
Release E.10.43 Enhancements
Release E.10.43 Enhancements
Release E.10.43 includes the following enhancement:
■
The "show tech transceiver" CLI command output now contains the HP part number and
revision information for all transceivers on the switch.
Release E.10.44 Enhancements
Release E.10.44 includes the following enhancement:
■
DHCP Protection enhancement for switch 5300xl. See DHCP Snooping below.
Release E.10.45 included software fixes only, no new enhancements.
DHCP Snooping
Overview
You can use DHCP snooping to help avoid the Denial of Service attacks that result from unauthorized
users adding a DHCP server to the network that then provides invalid configuration data to other
DHCP clients on the network. DHCP snooping accomplishes this by allowing you to distinguish
between trusted ports connected to a DHCP server or switch and untrusted ports connected to endusers. DHCP packets are forwarded between trusted ports without inspection. DHCP packets
received on other switch ports are inspected before being forwarded. Packets from untrusted sources
are dropped. Conditions for dropping packets are shown below.
Condition for Dropping a Packet
Packet Types
A packet from a DHCP server received on an untrusted port
DHCPOFFER, DHCPACK, DHCPNACK
If the switch is configured with a list of authorized DHCP server addresses DHCPOFFER, DHCPACK, DHCPNACK
and a packet is received from a DHCP server on a trusted port with a source
IP address that is not in the list of authorized DHCP server addresses.
Unless configured to not perform this check, a DHCP packet received on N/A
an untrusted port where the DHCP client hardware address field does not
match the source MAC address in the packet
Unless configured to not perform this check, a DHCP packet containing
DHCP relay information (option 82) received from an untrusted port
N/A
A broadcast packet that has a MAC address in the DHCP binding database, DHCPRELEASE, DHCPDECLINE
but the port in the DHCP binding database is different from the port on which
the packet is received
47
Enhancements
Release E.10.44 Enhancements
Enabling DHCP Snooping
DHCP snooping is enabled globally by entering this command:
ProCurve(config)# dhcp-snooping
Use the no form of the command to disable DHCP snooping.
Syntax: [no] dhcp-snooping [authorized-server | database | option | trust | verify |
vlan]
authorized server: Enter the IP address of a trusted DHCP
server. If no authorized servers are configured, all DHCP
server addresses are considered valid.
Maximum: 20 authorized servers
database: To configure a location for the lease database,
enter a URL in the format tftp://ip-addr/ascii-string. The
maximum number of characters for the URL is 63.
option: Add relay information option (Option 82) to DHCP
client packets that are being forwarded out trusted ports.
The default is yes, add relay information.
trust: Configure trusted ports. Only server packets received
on trusted ports are forwarded. Default: untrusted.
verify: Enables DHCP packet validation. The DHCP client
hardware address field and the source MAC address must
be the same for packets received on untrusted ports or the
packet is dropped. Default: Yes
vlan: Enable DHCP snooping on a vlan. DHCP snooping
must be enabled already. Default: No
To display the DHCP snooping configuration, enter this command:
ProCurve(config)# show dhcp-snooping
An example of the output is shown in the following figure.
48
Enhancements
Release E.10.44 Enhancements
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
:
Verify MAC
: Yes
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: mac
Store lease database : Not configured
Port Trust
----- ----B1
No
B2
No
B3
No
Figure 11. An Example of the DHCP Snooping Command Output
To display statistics about the DHCP snooping process, enter this command:
ProCurve(config)# show dhcp-snooping stats
An example of the output is shown below.
ProCurve(config)# show dhcp-snooping stats
Packet type
----------server
client
server
server
client
client
client
client
Action
------forward
forward
drop
drop
drop
drop
drop
drop
Reason
Count
---------------------------- --------from trusted port
8
to trusted port
8
received on untrusted port
2
unauthorized server
0
destination on untrusted port 0
untrusted option 82 field
0
bad DHCP release request
0
failed verify MAC check
0
Figure 12. Example of Show DHCP Snooping Statistics
Enabling DHCP Snooping on VLANS
DHCP snooping on VLANs is disabled by default. To enable DHCP snooping on a VLAN or range of
VLANs enter this command:
ProCurve(config)# dhcp-snooping vlan <vlan-id-range>
49
Enhancements
Release E.10.44 Enhancements
You can also use this command in the vlan context, in which case you cannot enter a range of VLANs
for snooping.
Below is an example of DHCP snooping enabled on VLAN 4.
ProCurve(config)# dhcp-snooping vlan 4
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
: 4
Verify MAC
: Yes
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: mac
Figure 13. Example of DCHP Snooping on a VLAN
Configuring DHCP Snooping Trusted Ports
By default, all ports are untrusted. To configure a port or range of ports as trusted, enter this
command:
ProCurve(config)# dhcp-snooping trust <port-list>
You can also use this command in the interface context, in which case you are not able to enter a list
of ports.
50
Enhancements
Release E.10.44 Enhancements
ProCurve(config)# dhcp-snooping trust B1-B2
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
: 4
Verify MAC
: Yes
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: mac
Store lease database : Not configured
Port
----B1
B2
B3
Trust
----Yes
Yes
No
Figure 14. Example of Setting Trusted Ports
DHCP server packets are forwarded only if received on a trusted port; DHCP server packets received
on an untrusted port are dropped.
Use the no form of the command to remove the trusted configuration from a port.
Configuring Authorized Server Addresses
If authorized server addresses are configured, a packet from a DHCP server must be received on a
trusted port AND have a source address in the authorized server list in order to be considered valid.
If no authorized servers are configured, all servers are considered valid. You can configure a
maximum of 20 authorized servers.
To configure a DHCP authorized server address, enter this command in the global configuration
context:
ProCurve(config)# dhcp-snooping authorized-server
<ip-address>
51
Enhancements
Release E.10.44 Enhancements
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
: 4
Verify MAC
: No
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: subnet-ip
Authorized Servers
--------------------111.222.3.4
10.0.0.11
Figure 15. Example of Authorized Servers for DHCP Snooping
Using DHCP Snooping with Option 82
DHCP adds Option 82 (relay information option) to DHCP request packets received on untrusted
ports by default. (See the preceding section Configuring DHCP Relay for more information on
Option 82.)
When DHCP is enabled globally and also enabled on a VLAN, and the switch is acting as a DHCP
relay, the settings for the DHCP relay Option 82 command are ignored when snooping is controlling
Option 82 insertion. Option 82 inserted in this manner allows the association of the client’s lease with
the correct port, even when another device is acting as a DHCP relay or when the server is on the
same subnet as the client.
Note
DHCP snooping only overrides the Option 82 settings on a VLAN that has snooping enabled, not on
VLANS without snooping enabled.
If DHCP snooping is enabled on a switch where an edge switch is also using DHCP snooping, it is
desirable to have the packets forwarded so the DHCP bindings are learned. To configure the policy
for DHCP packets from untrusted ports that already have Option 82 present, enter this command in
the global configuration context.
52
Enhancements
Release E.10.44 Enhancements
Syntax: [no] dhcp-snooping option 82 [remote-id <mac | subnet-ip | mgmt-ip>]
[untrusted-policy <drop | keep | replace>]
Enables DHCP Option 82 insertion in the packet.
remote-id
Set the value used for the remote-id field of the
relay information option.
mac: The switch mac address is used for the
remote-id. This is the default.
subnet-ip: The IP address of the VLAN the packet
was received on is used for the remote-id. If
subnet-ip is specified but the value is not set, the
MAC address is used.
mgmt-ip: The management VLAN IP address is
used as the remote-id. If mgmt-ip is specified but
the value is not set, the MAC address is used.
untrustedpolicy
Configures DHCP snooping behavior when
forwarding a DHCP packet from an untrusted
port that already contains DHCP relay information (Option 82). The default is drop.
drop: The packet is dropped.
keep: The packet is forwarded without replacing
the option information.
replace: The existing option is replaced with a
new Option 82 generated by the switch.
Note
The default drop policy should remain in effect if there are any untrusted nodes, such as clients,
directly connected to this switch.
Changing the Remote-id from a MAC to an IP Address
By default, DHCP snooping uses the MAC address of the switch as the remote-id in Option 82
additions. The IP address of the VLAN the packet was received on or the IP address of the
management VLAN can be used instead by entering this command with the associated parameter:
ProCurve(config)# dhcp-snooping option 82 remote-id
<mac|subnet-ip|mgmt-ip>
53
Enhancements
Release E.10.44 Enhancements
ProCurve(config)# dhcp-snooping option 82 remote-id subnetip
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
: 4
Verify MAC
: Yes
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: subnet-ip
Figure 16. Example of DHCP Snooping Option 82 using the VLAN IP Address
Disabling the MAC Address Check
DHCP snooping drops DHCP packets received on untrusted ports when the check address (chaddr)
field in the DHCP header does not match the source MAC address of the packet (default behavior).
To disable this checking, use the no form of this command.
ProCurve(config)# dhcp-snooping verify mac
ProCurve(config)# dhcp-snooping verify mac
ProCurve(config)# show dhcp-snooping
DHCP Snooping Information
DHCP Snooping
: Yes
Enabled Vlans
: 4
Verify MAC
: yes
Option 82 untrusted policy : drop
Option 82 Insertion
: Yes
Option 82 remote-id
: subnet-ip
Figure 17. Example Showing the DHCP Snooping Verify MAC Setting
54
Enhancements
Release E.10.44 Enhancements
The DHCP Binding Database
DHCP snooping maintains a database of up to 8192 DHCP bindings on untrusted ports. Each binding
consists of:
•
Client MAC address
•
Port number
•
VLAN identifier
•
Leased IP address
•
Lease time
The switch can be configured to store the bindings at a specific URL so they will not be lost if the
switch is rebooted. If the switch is rebooted, it will read its binding database from the specified
location. To configure this location use this command.
Syntax: [no] dhcp-snooping database [file<tftp://<ip-address>/<ascii-string>>]
[delay<15-86400>][ timeout<0-86400>]
file
Must be in Uniform Resource Locator (URL)
format — “tftp://ip-address/ascii-string”. The
maximum filename length is 63 characters.
delay
Number of seconds to wait before writing to the
database. Default = 300 seconds.
timeout
Number of seconds to wait for the database file
transfer to finish before returning an error. A
value of zero (0) means retry indefinitely.
Default = 300 seconds.
A message is logged in the system event log if the DHCP binding database fails to update.
To display the contents of the DHCP snooping binding database, enter this command.
Syntax:
show dhcp-snooping binding
ProCurve(config)# show dhcp-snooping binding
MacAddress
------------22.22.22.22.22.22
IP
VLAN Interface Time left
--------------- ---- --------- --------10.0.0.1
4
B2
1600
Figure 18. Example Showing DHCP Snooping Binding Database Contents
55
Enhancements
Release E.10.44 Enhancements
Note
If a lease database is configured, the switch drops all DHCP packets until the lease database is read.
This only occurs when the switch reboots and is completed quickly. If the switch is unable to read
the lease database from the tftp server, it waits until that operation times out and then begins
forwarding DHCP packets.
Enabling Debug Logging
To enable debug logging for DHCP snooping, use this command.
Syntax: [no] debug dhcp-snooping [agent | event | packet]
agent
Displays DHCP snooping agent messages.
event
Displays DHCP snooping event messages.
packet
Displays DHCP snooping packet messages.
Operational Notes
■
DHCP is not configurable from the web management interface or menu interface.
■
If packets are received at too high a rate, some may be dropped and need to be re-transmitted.
■
ProCurve recommends running a time synchronization protocol such as SNTP in order to
track lease times accurately.
■
A remote server must be used to save lease information or there may be a loss of connectivity
after a switch reboot.
Log Messages
Server <ip-address> packet received on untrusted port <port-number> dropped. Indicates a DHCP server on an untrusted port is attempting to transmit a packet. This event is recognized
by the reception of a DHCP server packet on a port that is configured as untrusted.
Ceasing untrusted server logs for %s. More than one packet was received from a DHCP server
on an untrusted port. To avoid filling the log file with repeated attempts, untrusted server drop packet
events will not be logged for the specified <duration>.
Client packet destined to untrusted port <port-number>
dropped. Indicates that the destination of a DHCP client unicast packet is on an untrusted port.
This event is recognized when a client unicast packet is dropped because the destination address is
out a port configured as untrusted.
56
Enhancements
Release E.10.44 Enhancements
Ceasing untrusted port destination logs for %s. More that one client unicast packet with an
untrusted port destination was dropped. To avoid filling the log file with repeated attempts, untrusted
port destination attempts will not be logged for the specified <duration>.
Unauthorized server <ip-address> detected on port
<port-number>. Indicates that an unauthorized DHCP server is attempting to send packets. This
event is recognized when a server packet is dropped because there are configured authorized servers
and a server packet is received from a server that is not configured as an authorized server.
Ceasing unauthorized server logs for <duration>. More than one unauthorized server packet
was dropped. To avoid filling the log file with repeated attempts, unauthorized server transmit
attempts will not be logged for the specified <duration>.
Received untrusted relay information from client <mac-address> on port <port-number>.
Indicates the reception on an untrusted port of a client packet containing a relay information option
field. This event is recognized when a client packet containing a relay information option field is
dropped because it was received on a port configured as untrusted.
Ceasing untrusted relay information logs for <duration>. More than one DHCP client packet
received on an untrusted port with a relay information field was dropped. To avoid filling the log file
with repeated attempts, untrusted relay information packets will not be logged for the specified
<duration>.
Client address <mac-address> not equal to source MAC <mac-address> detected on port
<port-number>. Indicates that a client packet source MAC address does not match the “chaddr”
field. This event is recognized when the dhcp-snooping agent is enabled to filter DHCP client packets
that do not have a matching “chaddr” field and source MAC address.
Ceasing MAC mismatch logs for <duration>. More than one DHCP client packet with a
mismatched source MAC and chaddr field was dropped. To avoid filling the log file with repeated
attempts, client address mismatch events will not be logged for the specified <duration>.
Attempt to release address <ip-address> leased to port <port-number> detected on port
<port-number> dropped. Indicates an attempt by a client to release an address when a DHCPRELEASE or DHCPDECLINE packet is received on a port different from the port the address was leased
to.
Ceasing bad release logs for %s. More than one bad DHCP client release packet was dropped.
To avoid filling the log file with repeated bad release dropped packets, bad releases will not be logged
for <duration>.
Lease table is full, DHCP lease was not added. The lease table is full and this lease will not be
added to it.
57
Enhancements
Release E.10.46 Enhancements
Write database to remote file failed errno (error-num). An error occurred while writing the
temporary file and sending it using tftp to the remote server.
DHCP packets being rate-limited. Too many DHCP packets are flowing through the switch and
some are being dropped.
Snooping table is full. The DHCP binding table is full and subsequent bindings are being dropped.
Release E.10.46 Enhancements
Release E.10.46 includes the following enhancements:
■
Enhancement (PR_1000346164) — RSTP/MSTP BPDU Protection enhancement. When
this feature is enabled on a port and that port receives a spanning tree BPDU, the switch will
disable (drop link) the port, log a message, and optionally, send an SNMP TRAP.
■
Enhancement (PR_1000365862) — Addition to the RSTP/MSTP BPDU Protection
enhancement. This portion of the enhancement added the option of configuring ports that
had been previously disabled by BPDU Protection to be automatically re-enabled.
Spanning Tree BPDU Protection
The BPDU protection feature is a security enhancement to Spanning Tree Protocol (STP) operation.
It can be used to protect the active STP topology by delimiting its legal boundaries, thereby preventing
spoofed BPDU packets from entering the STP domain. In a typical implementation, BPDU protection
would be applied to edge ports connected to end user devices that do not run STP. If STP BPDU
packets are received on a protected port, the feature will disable that port and alert the network
manager via an SNMP trap as shown in Figure 19.
58
Enhancements
Release E.10.46 Enhancements
STP Domain
SNMP Trap
Management
Station
SNMP Trap
SNMP Trap
Switch
Event Log: port X is disable by STP
BPDU protection
Fake STP BPDU
End User
Figure 19. Example of BPDU Protection Enabled at the Network Edge
Terminology
BPDU — Acronym for bridge protocol data unit. BPDUs are data messages that are exchanged
between the switches within an extended LAN that use a spanning tree protocol topology. BPDU
packets contain information on ports, addresses, priorities and costs and ensure that the data ends
up where it was intended to go. BPDU messages are exchanged across bridges to detect loops in a
network topology. The loops are then removed by placing redundant switch ports in a backup, or
blocked, state.
BPDU Filtering — Spanning-tree configuration mode that prevents the switch from receiving and
transmitting BPDU frames on a specific port.
BPDU Protection — Spanning-tree configuration mode which disables a port where BPDU frames
are received.
MSTP — Multiple Spanning Tree Protocol, defined in IEEE 802.1s. Each MSTI (multiple spanning
tree instance) on a physical port provides loop free connectivity for the group of VLANs associated
with that instance. This means that traffic transported on different VLANs can be distributed for loadbalancing among links between switches.
RSTP — Rapid Spanning Tree Protocol, defined in IEEE 802.1w and ratified in IEEE 802.1D-2004.
Spanning-tree — Generic term to refer to the many spanning-tree flavors: now deprecated STP,
RSTP and VLAN-aware MSTP.
59
Enhancements
Release E.10.46 Enhancements
STP — Spanning Tree Protocol, part of the original IEEE 802.1D specification. The 2004 edition
completely deprecates STP. Both RSTP and MSTP have fallback modes to handle STP.
SNMP — Simple Network Management Protocol, used to remotely manage network devices.
Note
The switches covered in these Release Notes, use the IEEE 802.1s Multiple Spanning Tree Protocol
(MSTP) standard. Under standard settings, your MSTP-configured switch interoperates effectively
with both STP (IEEE 802.1D) and RSTP (IEEE 802.1w) spanning-tree devices. For more information,
refer to the chapter entitled Multiple Instance Spanning-Tree Operation in the Advanced Traffic
Management Guide for your switch.
Configuring STP BPDU Protection
The following commands allow you to configure BPDU protection via the CLI.
Syntax: [no] spanning-tree <port-list> bpdu protection
Enables/disables the BPDU protection feature on a port
Syntax: [no] spanning-tree trap errant bpdu
Enables/disables the sending of errant BPDU traps.
For example, to configure BPDU protection on ports 1 to 10, enter:
ProCurve(config)# spanning-tree 1-10 bpdu protection
When BPDU protection is enabled, the following steps are set in process:
1.
When an STP BPDU packet is received, STP treats it as an unauthorized transmission attempt
and shuts down the port that the BPDU came in on.
2.
An event message is logged and an SNMP notification trap is generated.
3.
The port remains disabled until re-enabled manually by a network administrator.
Caution
This command should only be used to guard edge ports that are not expected to participate in STP
operations. Once BPDU protection is enabled, it will disable the port as soon as any BPDU packet is
received on that interface.
60
Enhancements
Release E.10.47 Enhancements
Viewing BPDU Protection Status
The show spanning-tree command has additional information on BPDU protection as shown below.
ProCurve# show spanning-tree 1-10
Multiple Spanning Tree (MST) Information
STP Enabled
: Yes
Force Version : MSTP-operation
IST Mapped VLANs : 1-7
Ports with BPDU protection enabled
...
Protected Ports : 3-7,9
Filtered Ports : 10
Port
---1
2
3
4
5
6
7
8
9
10
Type
--------100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
100/1000T
|
|
+
|
|
|
|
|
|
|
|
|
|
Cost
--------200000
200000
200000
Auto
200000
200000
200000
Auto
Auto
200000
Errant BPDU detected on this port
Prio
rity
----128
128
128
128
128
128
128
128
128
128
State
---------Forwarding
Forwarding
BpduError
Disabled
Forwarding
Forwarding
Forwarding
Disabled
Disabled
Forwarding
|
|
+
|
|
|
|
|
|
|
|
|
|
Designated
Bridge
------------000883-024500
000883-122740
Hello
Time
----2
2
2
PtP
--Yes
Yes
Yes
2
2
2
Yes Yes
Yes Yes
Yes Yes
2
Yes Yes
Edge
---No
No
Yes
Example of BPDU Protection Additions to Show Spanning Tree Command
Release E.10.47 Enhancements
Release E.10.47 included software fixes only, no new enhancements.
Release E.10.48 Enhancements
Release E.10.48 includes the following enhancements:
Enhancement (PR_1000376406) — Loop Protection feature additions, including packet authentication, loop detected trap, and receiver port configuration. See “Configuring Loop Protection” on
page 62.
61
Enhancements
Release E.10.48 Enhancements
Enhancement (PR_1000379804) — Historical information about MAC addresses that have been
moved has been added to the "show tech" command output.
Configuring Loop Protection
You can use BPDU protection for systems that have spanning tree enabled (See “Spanning Tree BPDU
Protection” on page 58), however, the BPDU protection feature cannot detect the formation of loops
when an unmanaged device on the network drops spanning tree packets. To protect against the
formation of loops in these cases, you can enable the Loop Protection feature, which provides
protection by transmitting loop protocol packets out ports on which loop protection has been
enabled. When the switch sends out a loop protocol packet and then receives the same packet on a
port that has send-disable configured, it shuts down the port from which the packet was sent.
You can configure the disable-timer parameter for the amount of time you want the port to remain
disabled (0 to 604800 seconds). If you configure a value of zero, the port will not be re-enabled.
To enable loop protection, enter this command:
ProCurve(config)# loop-protect <port-list>
Syntax: [no] loop-protect <port-list> [receiver-action <send-disable | no-disable> |]
[transmit-interval <1-10> ] | [disable-timer <0-604800>] |
[trap <loop-detected>]
Allows you to configure per-port loop protection on the switch.
[receiver-action <send-disable | no-disable>]
Sets the action to be taken when a loop is detected on the port. The port that received
the loop protection packet determines what action is taken. If send-disable is
configured, the port that transmitted the packet is disabled. If no-disable is
configured, the port is not disabled.
Default: send-disable
[trap <loop-detected>]
Allows you to configure loop protection traps The “loop-detected” trap indicates
that a loop was detected on a port.
[disable-timer <0-604800>]
How long (in seconds) a port is disabled when a loop has been detected. A value
of zero disables the auto re-enable functionality.
Default: Timer is disabled
[transmit-interval <1-10>]
Allows you to configure the time in seconds between the transmission of loop
protection packets.
Default: 5 seconds
62
Enhancements
Release E.10.49 Enhancements
To display information about ports with loop protection, enter this command.
Syntax: show loop-protect <port-list>
Displays the loop protection status. If no ports are specified, the information is
displayed only for the ports that have loop protection enabled.
ProCurve(config)# show loop-protect 1-4
Status and Counters - Loop Protection Information
Transmit Interval (sec) : 5
Port Disable Timer (sec) : 5
Loop Detected Trap
: Enabled
Port
---1
2
3
4
Loop
Loop
Loop
Time
Protection Detected Count
Since Last Loop
----------- --------- ---------- ---------------Yes
No
0
Yes
No
0
Yes
No
0
Yes
No
0
Rx
Action
-----------send-disable
send-disable
send-disable
send-disable
Port
Status
-------Up
Up
Up
Up
Figure 20. Example of Show Loop Protect Display
Release E.10.49 Enhancements
Release E.10.49 includes the following enhancement:
■
63
Enhancement (PR_1000336169) — Added support for STP Per Port BPDU Filtering and
related SNMP Traps. See Spanning Tree Per-Port BPDU Filtering on the following page.
Enhancements
Release E.10.49 Enhancements
Spanning Tree Per-Port BPDU Filtering
The STP BPDU filter feature allows control of spanning-tree participation on a per-port basis. It can
be used to exclude specific ports from becoming part of spanning tree operations. A port with the
BPDU filter enabled will ignore incoming BPDU packets and stay locked in the spanning-tree
forwarding state. All other ports will maintain their role.
Here are some sample scenarios in which this feature may be used:
■
To have STP operations running on selected ports of the switch rather than every port of the
switch at a time.
■
To prevent the spread of errant BPDU frames.
■
To eliminate the need for a topology change when a port's link status changes. For example,
ports that connect to servers and workstations can be configured to remain outside of
standard spanning-tree operations.
■
To protect the network from denial of service attacks with spoofing spanning-tree BPDUs
by dropping incoming BPDU frames.
Note
BPDU protection imposes a more secure mechanism that implements port shut down and a detection
alert when an errant BPDU frame is received (see page 58 for details). BPDU protection will take
precedence over BPDU filtering if both features have been enabled on the same port.
Configuring STP BPDU Filters
The following commands allow you to configure BPDU filters via the CLI.
Syntax: [no] spanning-tree <port-list | all> bpdu-filter
Enables/disables the BPDU filter feature on the specified port(s).
For example, to configure BPDU filtering on port a9, enter:
ProCurve(config)# spanning-tree a9 bpdu-filter
64
Enhancements
Release E.10.49 Enhancements
Caution
Ports configured with the BPDU filter mode remain active (learning and forward frames); however,
spanning-tree cannot receive or transmit BPDUs on the port. The port remains in a forwarding state,
permitting all broadcast traffic. This can create a network storm if there are any loops (that is, trunks
or redundant links) using these ports. If you suddenly have a high load, disconnect the link and
remove ("no") the bpdu-filter.
Viewing Status of BPDU Filtering
The show spanning-tree <port-list> detail command has been extended to show per-port BPDU filter
mode as shown below.
ProCurve# show spanning-tree a9 detail
Status and Counters - CST Port(s) Detailed Information
Port
Status
BPDU Filtering
Errant BPUDUs received
MST Region Boundary
External Path Cost
External Root Path Cost
Administrative Hello Time
Operational Hello Time
AdminEdgePort
OperEdgePort
AdminPointToPointMAC
OperPointToPointMAC
Aged BPDUs Count
Loop-back BPDUs Count
TC ACK Flag Transmitted
TC ACK Flag Received
MST
BPDUs Tx
---------8
MST
BPDUs Rx
---------28
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
:
A1
Up
Yes
65
Yes
200000
420021
Use Global
2
No
No
Force-True
Yes
0
0
0
0
CFG
BPDUs Tx
---------0
Rows indicating BPDU filtering
has been enabled and number of
errant BPDUs received.
Column indicating BPDU frames
accepted for processing when
permitted by BPDU filter.
CFG
BPDUs Rx
---------0
TCN
BPDUs Tx
---------0
TCN
BPDUs Rx
---------0
Figure 21. Example of BPDU Filter Fields in Show Spanning Tree Detail Command
65
Enhancements
Release E.10.49 Enhancements
The show spanning-tree command has also been extended to display BPDU filtered ports.
ProCurve# show spanning-tree
Multiple Spanning Tree (MST) Information
STP Enabled
: Yes
Force Version : MSTP-operation
IST Mapped VLANs : 1-7
Row showing ports with BPDU filters enabled
...
Protected Ports :
Filtered Ports : A6-A7
....
Figure 22. Example of BPDU Filtered Ports Field in Show Spanning Tree Command
Viewing Configuration of BPDU Filtering
The BPDU filter mode adds an entry to the spanning tree category within the configuration file.
ProCurve(config)# show configuration
. . .
Rows showing ports with BPDU filters enabled
spanning-tree
spanning-tree A7 bpdu-filter
spanning-tree C9 bpdu-filter
spanning-tree Trk2 priority 4
. . .
Figure 23. Example of BPDU Filters in the Show Configuration Command
The spanning-tree show < port> configuration command displays the BPDU’s filter state.
ProCurve(config)# show spanning-tree a8 config
...
Column showing BPDU filter status
BPDU
Port Type
| Cost
Priority Edge Point-to-Point MCheck Filter
---- --------- + --------- -------- ---- -------------- ------ -----A8
100/1000T | Auto
128
Yes Force-True
Yes
No
Figure 24. Example of BPDU Filter Status in Show Spanning Tree Configuration Command
66
Enhancements
Release E.10.50 Enhancements
Release E.10.50 Enhancements
Release E.10.50 includes the following enhancement:
■
Enhancement (PR_1000335860) — This enhancement provides a configuration option
for the source IP address field of SNMP response and SNMP trap PDUs.
Release E.10.51 Enhancements
Release E.10.51 includes the following enhancement:
■
Enhancement (PR_1000385565) — (CLI) The port security MAC address limit per port
has been increased from 8 to 32 when learn mode is ‘static’ or ‘configured’. However, the
global limit of static/configured MAC addresses per ProCurve Series 5300 switch is 1664.
Release E.10.52 Enhancements
Release E.10.52 includes the following enhancement:
■
Enhancement (PR_1000374085) — This enhancement expands the use of the Controlled
Directions parameter to also support MAC and Web authentication. See “Configuring 802.1X
Controlled Directions” on page 45 for additional information on using Controlled Directions.
Release E.10.53 Enhancements
Release E.10.53 includes the following enhancement:
■
Enhancement (PR_1000376626) — Enhanced CLI qos dscp-map he help and show dscpmap"text to warn user that inbound classification based on DSCP codepoints only occurs if
"qos type-of-service diff-services" is also configured.
Release E.10.54 and E.10.55 Enhancements
Release E.10.54 was never released, and had no new enhancements.
Release E.10.55 had no new enhancements, software fixes only.
67
Enhancements
Release E.10.56 Enhancements
Release E.10.56 Enhancements
Release E.10.56 contains software fixes only, no new enhancements.
Release E.10.57 Enhancements
Release E.10.57 contains software fixes only, no new enhancements.
Releases E.10.58 and E.10.59 Enhancements
Releases E.10.58 and E.10.59 were never built (Never built).
Release E.10.60 Enhancements
Release E.10.60 contains software fixes only, no new enhancements.
Release E.10.61 Enhancements
Release E.10.61 contains software fixes only, no new anointments.
Release E.10.62 Enhancements
Release E.10.62 contains software fixes only, no new anointments.
Release E.10.63 Enhancements
Release E.10.63 contains software fixes only, no new anointments.
Release E.10.64 Enhancements
Release E.10.64 includes the following enhancement:
68
Enhancements
Dynamic ARP Protection
■
Enhancement (PR_1000340292) — Flash file system compaction improvements were
completed.
■
Enhancement (PR_1000433763) — The Dynamic ARP Protection feature was added.
Dynamic ARP Protection
Introduction
On the VLAN interfaces of a routing switch, dynamic ARP protection ensures that only valid ARP
requests and responses are relayed or used to update the local ARP cache. ARP packets with invalid
IP-to-MAC address bindings advertised in the source protocol address and source physical address
fields are discarded. For more information about the ARP cache, refer to “ARP Cache Table” in the
Multicast and Routing Guide.
ARP requests are ordinarily broadcast and received by all devices in a broadcast domain. Most ARP
devices update their IP-to-MAC address entries each time they receive an ARP packet even if they
did not request the information. This behavior makes an ARP cache vulnerable to attacks.
Because ARP allows a node to update its cache entries on other systems by broadcasting or unicasting
a gratuitous ARP reply, an attacker can send his own IP-to-MAC address binding in the reply that
causes all traffic destined for a VLAN node to be sent to the attacker's MAC address. As a result, the
attacker can intercept traffic for other hosts in a classic "man-in-the-middle" attack. The attacker
gains access to any traffic sent to the poisoned address and can capture passwords, e-mail, and VoIP
calls or even modify traffic before re-sending it.
Another way in which the ARP cache of known IP addresses and associated MAC addresses can be
poisoned is through unsolicited ARP responses. For example, an attacker can associate the IP address
of the network gateway with the MAC address of a network node. In this way, all outgoing traffic is
prevented from leaving the network because the node does not have access to outside networks. As
a result, the node is overwhelmed by outgoing traffic destined to another network.
Dynamic ARP protection is designed to protect your network against ARP poisoning attacks in the
following ways:
■
Allows you to differentiate between trusted and untrusted ports.
■
Intercepts all ARP requests and responses on untrusted ports before forwarding them.
■
Verifies IP-to-MAC address bindings on untrusted ports with the information stored in the lease
database maintained by DHCP snooping and user-configured static bindings (in non-DHCP
environments):
69
•
If a binding is valid, the switch updates its local ARP cache and forwards the packet.
•
If a binding is invalid, the switch drops the packet, preventing other network devices from
receiving the invalid IP-to-MAC information.
Enhancements
Dynamic ARP Protection
DHCP snooping intercepts and examines DHCP packets received on switch ports before
forwarding the packets. DHCP packets are checked against a database of DHCP binding information. Each binding consists of a client MAC address, port number, VLAN identifier, leased IP
address, and lease time. The DHCP binding database is used to validate packets by other security
features on the switch.
If you have already enabled DHCP snooping on a switch, you may also want to add static IP-toMAC address bindings to the DHCP snooping database so that ARP packets from devices that
have been assigned static IP addresses are also verified.
■
Supports additional checks to verify source MAC address, destination MAC address, and IP
address.
ARP packets that contain invalid IP addresses or MAC addresses in their body that do not match
the addresses in the Ethernet header are dropped.
When dynamic ARP protection is enabled, only ARP request and reply packets with valid IP-to-MAC
address bindings in their packet header are relayed and used to update the ARP cache.
Dynamic ARP protection is implemented in the following ways on a switch:
■
You can configure dynamic ARP protection only from the CLI; you cannot configure this feature
from the web or menu interfaces.
■
Line rate—Dynamic ARP protection copies ARP packets to the switch CPU, evaluates the
packets, and then re-forwards them through the switch software. During this process, if ARP
packets are received at too high a line rate, some ARP packets may be dropped and will need to
be retransmitted.
■
The SNMP MIB, HP-ICF-ARP-PROTECT-MIB, is created to configure dynamic ARP protection
and to report ARP packet-forwarding status and counters.
Enabling Dynamic ARP Protection
To enable dynamic ARP protection for VLAN traffic on a routing switch, enter the arp protect vlan
command at the global configuration level.
Syntax: [no] arp protect vlan [vlan-range]
vlan-range
Specifies a VLAN ID or a range of VLAN IDs from
one to 4094; for example, 1–200.
An example of the arp protect vlan command is shown here:
ProCurve(config)# arp protect vlan 1-101
70
Enhancements
Dynamic ARP Protection
Configuring Trusted Ports
In a similar way to DHCP snooping, dynamic ARP protection allows you to configure VLAN interfaces
in two categories: trusted and untrusted ports. ARP packets received on trusted ports are forwarded
without validation.
By default, all ports on a switch are untrusted. If a VLAN interface is untrusted:
■
The switch intercepts all ARP requests and responses on the port.
■
Each intercepted packet is checked to see if its IP-to-MAC binding is valid. If a binding is invalid,
the switch drops the packet.
You must configure trusted ports carefully. For example, in the topology in Figure 4, Switch B may
not see the leased IP address that Host 1 receives from the DHCP server. If the port on Switch B that
is connected to Switch A is untrusted and if Switch B has dynamic ARP protection enabled, it will
see ARP packets from Host 1 as invalid, resulting in a loss of connectivity.
On the other hand, if Switch A does not support dynamic ARP protection and you configure the port
on Switch B connected to Switch A as trusted, Switch B opens itself to possible ARP poisoning from
hosts attached to Switch A.
Figure 4. Configuring Trusted Ports for Dynamic ARP Protection
Take into account the following configuration guidelines when you use dynamic ARP protection in
your network:
■
You should configure ports connected to other switches in the network as trusted ports. In this
way, all network switches can exchange ARP packets and update their ARP caches with valid
information.
■
Switches that do not support dynamic ARP protection should be separated by a router in their
own Layer 2 domain. Because ARP packets do not cross Layer 2 domains, the unprotected
switches cannot unknowingly accept ARP packets from an attacker and forward them to
protected switches through trusted ports.
71
Enhancements
Dynamic ARP Protection
To configure one or more Ethernet interfaces that handle VLAN traffic as trusted ports, enter the arp
protect trust command at the global configuration level. The switch does not check ARP requests and
responses received on a trusted port.
Syntax: [no] arp protect trust <port-list>
port-list
Specifies a port number or a range of port
numbers. Separate individual port numbers or
ranges of port numbers with a comma; for
example: c1-c3, c6.
An example of the arp protect trust command is shown here:
ProCurve(config)# arp protect trust b1-b4, d1
Adding an IP-to-MAC Binding to the DHCP Database
A routing switch maintains a DHCP binding database, which is used for DHCP and ARP packet
validation. Both the DHCP snooping and DHCP Option 82 insertion features maintain the lease
database by learning the IP-to-MAC bindings on untrusted ports. Each binding consists of the client
MAC address, port number, VLAN identifier, leased IP address, and lease time.
If your network does not use DHCP or if some network devices have fixed, user-configured IP
addresses, you can enter static IP-to-MAC address bindings in the DHCP binding database. The switch
uses manually configured static bindings for DHCP snooping and dynamic ARP protection.
To add the static configuration of an IP-to-MAC binding for a port to the database, enter the ip source
binding command at the global configuration level.
Syntax: [no] ip source binding <mac-address> vlan <vlan-id> <ip-address>
interface <port-number>
mac-address
Specifies a MAC address to bind with a VLAN
and IP address on the specified port in the
DHCP binding database.
vlan <vlan-id>
Specifies a VLAN ID number to bind with the
specified MAC and IP addresses on the specified port in the DHCP binding database.
ip-address
Specifies an IP address to bind with a VLAN
and MAC address on the specified port in the
DHCP binding database.
interface
Specifies the port number on which the IP-to<port-number> MAC address and VLAN binding is configured
in the DHCP binding database.
72
Enhancements
Dynamic ARP Protection
An example of the ip source binding command is shown here:
ProCurve(config)# ip source binding 0030c1-7f49c0
interface vlan 100 10.10.20.1 interface A4
Note
Note that the ip source binding command is the same command used by the Dynamic IP Lockdown
feature to configure static bindings. The Dynamic ARP Protection and Dynamic IP Lockdown features
share a common list of source IP-to-MAC bindings.
Configuring Additional Validation Checks on ARP Packets
Dynamic ARP protection can be configured to perform additional validation checks on ARP packets.
By default, no additional checks are performed. To configure additional validation checks, enter the
arp protect validate command at the global configuration level.
Syntax: [no] arp protect validate <[src-mac] | [dst-mac] | [ip]>
src-mac
(Optional) Drops any ARP request or response
packet in which the source MAC address in the
Ethernet header does not match the sender MAC
address in the body of the ARP packet.
dst-mac
(Optional) Drops any unicast ARP response packet
in which the destination MAC address in the
Ethernet header does not mach the target MAC
address in the body of the ARP packet.
ip
(Optional) Drops any ARP packet in which the
sender IP address is invalid. Drops any ARP
response packet in which the target IP address is
invalid. Invalid IP addresses include: 0.0.0.0,
255.255.255.255, all IP multicast addresses, and
all Class E IP addresses.
You can configure one or more of the validation checks. The following example of the arp protect
validate command shows how to configure the validation checks for source MAC address and
destination AMC address:
ProCurve(config)# arp protect validate src-mac dst-mac
73
Enhancements
Dynamic ARP Protection
Verifying the Configuration of Dynamic ARP Protection
To display the current configuration of dynamic ARP protection, including the additional validation
checks and the trusted ports that are configured, enter the show arp protect command:
ProCurve(config)# show arp protect
ARP Protection Information
Enabled Vlans : 1-4094
Validate : dst-mac, src-mac
Port
----B1
B2
B3
B4
B5
Trust
----Yes
Yes
No
No
No
Figure 5. The show arp protect Command
Displaying ARP Packet Statistics
To display statistics about forwarded ARP packets, dropped ARP packets, MAC validation failure,
and IP validation failures, enter the show arp protect statistics command:
ProCurve(config)# show arp protect statistics
Status and Counters - ARP Protection Counters for VLAN 1
Forwarded pkts
Bad bindings
Malformed pkts
: 10
: 1
: 0
Bad source mac
: 2
Bad destination mac: 1
Bad IP address
: 0
Status and Counters - ARP Protection Counters for VLAN 2
Forwarded pkts
Bad bindings
Malformed pkts
: 1
: 1
: 1
Bad source mac
: 1
Bad destination mac: 1
Bad IP address
: 1
Figure 6. Show arp protect statistics Command
74
Enhancements
Release E.10.65 Enhancements
Monitoring Dynamic ARP Protection
When dynamic ARP protection is enabled, you can monitor and troubleshoot the validation of ARP
packets with the debug arp protect command. Use this command when you want to debug the
following conditions:
■
The switch is dropping valid ARP packets that should be allowed.
■
The switch is allowing invalid ARP packets that should be dropped.
ProCurve(config)# debug arp protect
1. ARP request is valid
"DARPP: Allow ARP request 000000-000001,10.0.0.1 for 10.0.0.2 port A1,
vlan "
2. ARP request detected with an invalid binding
"DARPP: Deny ARP request 000000-000003,10.0.0.1 port A1, vlan 1"
3. ARP response with a valid binding
"DARPP: Allow ARP reply 000000-000002,10.0.0.2 port A2, vlan 1"
4.ARP response detected with an invalid binding
"DARPP: Deny ARP reply 000000-000003,10.0.0.2 port A2, vlan 1"
Figure 7. Example of debug arp protect Command
Release E.10.65 Enhancements
Release E.10.65 contains software fixes only, no new enhancements.
Release E.10.66 Enhancements
Release E.10.66 contains software fixes only, no new enhancements.
Release E.10.67 Enhancements
Release E.10.67 contains software fixes only, no new enhancements.
75
Enhancements
Release E.10.68 Enhancements
Release E.10.68 Enhancements
Release E.10.68 contains software fixes only, no new enhancements.
Release E.10.69 Enhancements
Release E.10.69 contains software fixes only, no new enhancements.
Release E.10.70 Enhancements
Release E.10.70 contains software fixes only, no new enhancements (Never released).
Release E.10.71 Enhancements
Release E.10.71 contains software fixes only, no new enhancements.
Release E.10.72 Enhancements
Release E.10.72 contains software fixes only, no new enhancements (Never released).
Release E.10.73 Enhancements
Release E.10.73 contains software fixes only, no new enhancements (Never released).
Release E.10.74 Enhancements
Release E.10.74 contains software fixes only, no new enhancements.
76
Enhancements
Release E.11.02 Enhancements
Release E.11.02 Enhancements
Release E.11.02 includes the following enhancements:
■
Enhancement (No PR) — There was a previously undocumented change to spanning tree
configuration (a change in the default to MSTP only) with the introduction of E.11.02. The
following command is no longer available in E.11.xx.
ProCurveSwitch(config)# spanning-tree protocol-version <stp | rstp | mstp >
Switches that have spanning tree enabled in the configuration will be running MSTP after
updating to the E.11.xx version software. MSTP is backwards-compatible with RSTP and STP.
MSTP uses the auto-edge port configuration default.
To force RSTP functionality after the update, use the following command:
ProCurveSwitch(config)# spanning tree force-version <stp-compatible | rstpcompatible>
■
Enhancement (PR_1000372989) — This enhancement enables the setting of operator/
manager username/password via SNMP. For more information, see “Using SNMP To View
and Configure Switch Authentication Features” below.
Using SNMP To View and Configure Switch Authentication Features
Beginning with software release E.11.02, manager read/write access is available for a subset of the
SNMP MIB objects for switch authentication (hpSwitchAuth) features. That is, in the default state,
a device with management access to the switch can view the configuration for several authentication
features, and using SNMP sets, can change elements of the authentication configuration.
Security Note
In the default configuration for SNMP MIB object access, SNMP sets can be used to reconfigure
password and key MIB objects. This means that a device operating as a management station with
access to the switch can be used to change the SNMP MIB settings. This can pose a security risk if
the feature is used to incorrectly configure authentication features or to reconfigure authentication
features to unauthorized settings. If you want to block the SNMP MIB object access described above,
use the following command to disable the feature:
ProCurve(config)# snmp-server mib hpswitchauthmib excluded
For more information on the above topic, refer to "Using SNMP To View and Configure Switch
Authentication Features" in the "RADIUS Authentication and Accounting" chapter of the Access
Security Guide for your switch. For an overview of the security features available on the switch,
refer to chapter 1, "Security Overview", in the Access Security Guide for your switch.
77
Enhancements
Release E.11.02 Enhancements
■
Enhancement — Support has been added for the ProCurve Switch 5300xl Series single port
10-GbE module, (J8988A), available March 1, 2008. The Guaranteed Minimum Bandwidth
feature is not supported by the new xl 1-Port 10-GbE X2 Module (J8988A). For more
information, see “Operating Rules for 5300xl Series 10-GbE Port Trunks” below.
Operating Rules for 5300xl Series 10-GbE Port Trunks
10-GbE Trunk rules:
■
Supports a maximum of 2 ports per trunk
■
The 5300xl switch chassis supports a maximum of four (4) 10-GbE modules
Media:
For proper trunk operation, all ports on both ends of a trunk group must have the same media type
and mode (speed and duplex). For the switches covered by this guide, ProCurve recommends leaving
the port Mode setting at Auto or, in networks using Cat 3 cabling, Auto-10.
Port Configuration:
The default port configuration is Auto, which enables a port to sense speed and negotiate duplex with
an Auto-Enabled port on another device. ProCurve recommends that you use the Auto setting for all
ports you plan to use for trunking. Otherwise, you must manually ensure that the mode setting for
each port in a trunk is compatible with the other ports in the trunk.
Figure 8. Recommended Port Mode Setting for LACP
Each of the following operate on a per-port basis, regardless of trunk membership:
■
Enable/Disable
■
Flow control (Flow Ctrl)
Trunk Configuration:
All ports in the same trunk group must be the same trunk type (LACP or Trunk). All LACP ports in
the same trunk group must be either all static LACP or all dynamic LACP.
78
Enhancements
Release E.11.02 Enhancements
A trunk appears as a single port labeled Dyn1 (for an LACP dynamic trunk) or Trk1 (for a static trunk
of type: LACP, Trunk) on various menu and CLI screens.
For spanning-tree or VLAN operation, configuration for all ports in a trunk is done at the trunk level.
You cannot separately configure individual ports within a trunk for spanning-tree or VLAN operation.
Traffic Distribution:
All of the switch trunk protocols use the SA/DA (Source Address/Destination Address) method of
distributing traffic across the trunked links.
■
Enhancement (PR_1000415155) — The ARP age timer was enhanced from the previous
limit of 240 minutes to allow for configuration of values up to 1440 minutes (24 hours) or
"infinite" (99,999,999 seconds or 3.2 years). For more information, see “ARP Age Timer
Increase” below.
ARP Age Timer Increase
The ARP age is the amount of time the switch keeps a MAC address learned through ARP in the ARP
cache. The switch resets the timer to zero each time the ARP entry is refreshed and removes the entry
if the timer reaches the ARP age.
You can increase the ARP age timeout maximum to 24 hours or more with this command:
Syntax: [no] ip arp-age <[1...1440] | infinite>
Allows the ARP age to be set from 1 to 1440 minutes (24 hours). If the option “infinite”
is configured, the internal ARP age timeout is set to 99,999,999 seconds
(approximately 3.2 years). An arp-age value of 0 (zero) is stored in the
configuration file to indicate that “infinite” has been configured. This value also
displays with the show commands and in the menu display (Menu > Switch
Configuration > IP Config).
Default: 20 minutes.
ProCurve(config)# ip arp-age 1000
Figure 1. Example of Setting the ARP Age Timeout to 1000 Minutes
To view the value of Arp Age timer, enter the show ip command as shown in Figure 2.
79
Enhancements
Release E.11.02 Enhancements
ProCurve(config)# show ip
Internet (IP) Service
IP Routing : Disabled
Default Gateway
Default TTL
Arp Age
Domain Suffix
DNS server
: 15.255.120.1
: 64
: 1000
:
:
VLAN
| IP Config IP Address
Subnet Mask
Proxy ARP
-------------------- + ---------- --------------- --------------- --------DEFAULT_VLAN
| Manual
15.255.111.13
255.255.248.0
No
Figure 2. Example of show ip Command Displaying Arp Age
You can also view the value of the Arp Age timer in the configuration file.
ProCurve(config)# show running-config
Running configuration:
; J9091A Configuration Editor; Created on release #K.12.XX
hostname "8200LP"
module 2 type J8702A
module 3 type J8702A
module 4 type J8702A
ip default-gateway 15.255.120.1
ip arp-age 1000
snmp-server community "public" Unrestricted
snmp-server host 16.180.1.240 "public"
vlan 1
name "DEFAULT_VLAN"
untagged B1-B24,C1-C24,D1-D24
ip address 15.255.120.85 255.255.248.0
exit
gvrp
spanning-tree
Figure 3. Example Showing ip arp-age Value in the Running Config File
80
Enhancements
Release E.11.02 Enhancements
You can set or display the arp-age value using the menu interface (Menu > Switch Configuration
> IP Config).
ProCurve
12-June-2007 14:45:31
===========================- TELNET - MANAGER MODE ======================
Switch Configuration - Internet (IP) Service
IP Routing : Disabled
Default Gateway : 15.255.120.1
Default TTL
: 64
Arp Age
: 1000
IP Config [Manual] : Manual
IP Address : 15.255.111.11
Subnet Mask : 255.255.248.0
Actions->
Cancel
Edit
Save
Help
Figure 4. Example of the Menu Interface Displaying the Arp Age Value
If the ARP cache should become full because entries are not cleared (due to increased timeout limits)
you can use the clear arp command to remove all non-permanent entries in the ARP cache.
To remove a specific entry in the ARP cache, enter this command:
Syntax: [no] arp IP-ADDRESS
Allows removal of any dynamic entry in the ARP cache.
■
Enhancement (PR_1000438015) — The banner message of the day (MOTD) size has been
increased to support up to 3070 characters.
The size of the login banner page increased from 320 to 3070 characters. The default banner
displays product registration information; the copyright splash is no longer displayed.
If a banner is configured, the banner page is displayed when the user accesses the Web user
interface. The default product registration information is not displayed as there is already a
product registration prompt displayed in the Web user interface.
■
81
Enhancement (PR_1000408960) — RADIUS-assigned GVRP VLANs are now supported.
For more information, see “How RADIUS-Based Authentication Affects VLAN Operation”
below.
Enhancements
Release E.11.02 Enhancements
How RADIUS-Based Authentication Affects VLAN Operation
Using a RADIUS server to authenticate clients, you can provide port-level security protection from
unauthorized network access for the following authentication methods:
■
802.1X: Port-based or client-based access control to open a port for client access after
authenticating valid user credentials.
■
MAC address: Authenticates a device’s MAC address to grant access to the network.
■
Web-browser interface: Authenticates clients for network access using a web page for user
login.
Note
You can use 802.1X (port-based or client-based) authentication and either Web or MAC authentication
at the same time on a port, with a maximum of 32 clients allowed on the port. (The default is one
client.) Web authentication and MAC authentication are mutually exclusive on the same port. Also,
you must disable LACP on ports configured for any of these authentication methods. For more
information, refer to the “Configuring Port-Based and User-Based Access Control (802.1X)” and “Web
and MAC Authentication” chapters of the Access Security Guide.
VLAN Assignment on a ProCurve Port
Following client authentication, VLAN configurations on a ProCurve port are managed as follows
when you use 802.1X, MAC, or Web authentication:
■
The port resumes membership in any tagged VLANs for which it is already assigned in the
switch configuration. Tagged VLAN membership allows a port to be a member of multiple
VLANs simultaneously.
■
The port is temporarily assigned as a member of an untagged (static or dynamic) VLAN for
use during the client session according to the following order of options.
a.
The port joins the VLAN to which it has been assigned by a RADIUS server during client
authentication.
b. If RADIUS authentication does not include assigning the port to a VLAN, then the switch
assigns the port to the authorized-client VLAN configured for the authentication method.
c.
If the port does not have an authorized-client VLAN configured, but is configured for
membership in an untagged VLAN, the switch assigns the port to this untagged VLAN.
82
Enhancements
Release E.11.02 Enhancements
Operating Notes
■
During client authentication, a port assigned to a VLAN by a RADIUS server or an authorizedclient VLAN configuration is an untagged member of the VLAN for the duration of the
authenticated session. This applies even if the port is also configured in the switch as a tagged
member of the same VLAN. The following restrictions apply:
•
If the port is assigned as a member of an untagged static VLAN, the VLAN must already
be configured on the switch. If the static VLAN configuration does not exist, the
authentication fails.
•
If the port is assigned as a member of an untagged dynamic VLAN that was learned
through GVRP, the dynamic VLAN configuration must exist on the switch at the time of
authentication and GVRP-learned dynamic VLANs for port-access authentication must
be enabled
If the dynamic VLAN does not exist or if you have not enabled the use of a dynamic VLAN
for authentication sessions on the switch, the authentication fails.
■
To enable the use of a GVRP-learned (dynamic) VLAN as the untagged VLAN used in an
authentication session, enter the aaa port-access gvrp-vlans command, as described in
“Enabling the Use of GVRP-Learned Dynamic VLANs in Authentication Sessions” on page 87.
■
Enabling the use of dynamic VLANs in an authentication session offers the following benefits:
•
You avoid the need of having static VLANs pre-configured on the switch.
•
You can centralize the administration of user accounts (including user VLAN IDs) on a
RADIUS server.
For information on how to enable the switch to dynamically create 802.1Q-compliant VLANs on
links to other devices using the GARP VLAN Registration Protocol (GVRP), refer to the “GVRP”
chapter in the Advanced Traffic Management Guide.
■
For an authentication session to proceed, a ProCurve port must be an untagged member of
the (static or dynamic) VLAN assigned by the RADIUS server (or an authorized-client VLAN
configuration). The port temporarily drops any current untagged VLAN membership.
If the port is not already a member of the RADIUS-assigned (static or dynamic) untagged VLAN,
the switch temporarily reassigns the port as an untagged member of the required VLAN (for the
duration of the session). At the same time, if the ProCurve port is already configured as an
untagged member of a different VLAN, the port loses access to the other VLAN for the duration
of the session. (A port can be an untagged member of only one VLAN at a time.)
When the authentication session ends, the switch removes the temporary untagged VLAN
assignment and re-activates the temporarily disabled, untagged VLAN assignment.
■
83
If GVRP is already enabled on the switch, the temporary untagged (static or dynamic) VLAN
created on the port for the authentication session is advertised as an existing VLAN.
Enhancements
Release E.11.02 Enhancements
If this temporary VLAN assignment causes the switch to disable a different untagged static or
dynamic VLAN configured on the port (as described in the preceding bullet and in “Example of
Untagged VLAN Assignment in a RADIUS-Based Authentication Session” on page 84), the
disabled VLAN assignment is not advertised. When the authentication session ends, the switch:
•
Removes the temporary untagged VLAN assignment and stops advertising it.
•
Re-activates and resumes advertising the temporarily disabled, untagged VLAN assignment.
■
If you modify a VLAN ID configuration on a port during an 802.1X, MAC, or Web
authentication session, the changes do not take effect until the session ends.
■
When a switch port is configured with RADIUS-based authentication to accept multiple
802.1X and/or MAC or Web authentication client sessions, all authenticated clients must use
the same port-based, untagged VLAN membership assigned for the earliest, currently active
client session.
Therefore, on a port where one or more authenticated client sessions are already running, all
such clients are on the same untagged VLAN. If a RADIUS server subsequently authenticates a
new client, but attempts to re-assign the port to a different, untagged VLAN than the one already
in use for the previously existing, authenticated client sessions, the connection for the new client
will fail. For more on this topic, refer to “802.1X Open VLAN Mode” in the “Configuring PortBased and Client-Based Access Control (802.1X)” chapter in the Access Security Guide.
Example of Untagged VLAN Assignment in a RADIUS-Based Authentication Session
The following example shows how an untagged static VLAN is temporarily assigned to a port for use
during an 802.1X authentication session. In the example, an 802.1X-aware client on port A2 has been
authenticated by a RADIUS server for access to VLAN 22. However, port A2 is not configured as a
member of VLAN 22 but as a member of untagged VLAN 33 as shown in Figure 5.
Scenario: An authorized
802.1X client requires
access to VLAN 22 from
port A2. However,
access to VLAN 22 is
blocked (not untagged
or tagged) on port A2
and VLAN 33 is untagged
on port A2.
84
Enhancements
Release E.11.02 Enhancements
Figure 5. Example of an Active VLAN Configuration in the Menu Interface View
In Figure 5, if RADIUS authorizes an 802.1X client on port A2 with the requirement that the client
use VLAN 22, then:
■
VLAN 22 becomes available as Untagged on port A2 for the duration of the session.
■
VLAN 33 becomes unavailable to port A2 for the duration of the session (because there can
be only one untagged VLAN on any port).
To view the temporary VLAN assignment as a change in the active configuration, use the show vlan
<vlan-id> command as shown in Figure 6, where <vlan-id> is the (static or dynamic) VLAN used in
the authenticated client session.
In the show command output, port A2 is temporarily
configured as untagged on VLAN 22 for an 802.1X session.
This temporary configuration change is necessary to
accommodate an 802.1X client’s access, authenticated by
a RADIUS server, in which the server included an
instruction to assign the client session to VLAN 22.
Note: In the current VLAN configuration ( 5), port A2 is only
listed as a member of VLAN 22 in show vlan 22 output
when an 802.1X session with an authenticated client is
active. Otherwise, port A2 is not listed.
Figure 6. Active Configuration for VLAN 22 Temporarily Changes for the 802.1X Session
However, as shown in Figure 5, because VLAN 33 is configured as untagged on port A2 and because
a port can be untagged on only one VLAN, port A2 loses access to VLAN 33 for the duration of the
802.1X session on VLAN 22.
You can verify the temporary loss of access to VLAN 33 by entering the show vlan 33 command as
shown in Figure 7.
85
Enhancements
Release E.11.02 Enhancements
Although port A2 is
configured as Untagged on
VLAN 33 (Figure 5), port A2
is not listed in show vlan 33
output during the 802.1X
session that uses VLAN 22
in Untagged mode.
However, when the 802.1X
session on VLAN 22 ends,
the active configuration
restores port A2 as an
untagged member of
VLAN 33.
Figure 7. Active Configuration for VLAN 33 Temporarily Drops Port 22 for the 802.1X Session
When the 802.1X client session on port A2 ends, the port removes the temporary untagged VLAN
membership. The static VLAN (VLAN 33) that is “permanently” configured as untagged on the
port becomes available again. Therefore, when the RADIUS-authenticated 802.1X session on
port A2 ends, VLAN 22 access on port A2 also ends, and the untagged VLAN 33 access on port
A2 is restored as shown in Figure 8.
When the 802.1X session
on VLAN 22 ends, the
active configuration
restores VLAN 33 on
port A2.
Figure 8. The Active Configuration for VLAN 33 Restores Port A2 After the 802.1X Session Ends
86
Enhancements
Release E.11.02 Enhancements
Enabling the Use of GVRP-Learned Dynamic VLANs in Authentication Sessions
Syntax:
aaa port-access gvrp-vlans
Enables the use of dynamic VLANs (learned through GVRP) in the temporary
untagged VLAN assigned by a RADIUS server on an authenticated port in an
802.1X, MAC, or Web authentication session.
Enter the no form of this command to disable the use of GVRP-learned VLANs in
an authentication session.
For information on how to enable a switch to dynamically create 802.1Qcompliant VLANs, refer to the “GVRP” chapter in the Access Security Guide.
Notes:
1. If a port is assigned as a member of an untagged dynamic VLAN, the dynamic
VLAN configuration must exist at the time of authentication and GVRP for portaccess authentication must be enabled on the switch.
If the dynamic VLAN does not exist or if you have not enabled the use of a dynamic
VLAN for authentication sessions on the switch, the authentication fails.
2. After you enable dynamic VLAN assignment in an authentication session, it
is recommended that you use the interface unknown-vlans command on a per-port
basis to prevent denial-of-service attacks. The interface unknown-vlans command
allows you to:
• Disable the port from sending advertisements of existing GVRP-created VLANs
on the switch.
• Drop all GVRP advertisements received on the port.
For more information, refer to the “GVRP” chapter in the Advanced Traffic
Management Guide.
3. If you disable the use of dynamic VLANs in an authentication session using
the no aaa port-access gvrp-vlans command, client sessions that were authenticated
with a dynamic VLAN continue and are not deauthenticated.
(This behavior differs form how static VLAN assignment is handled in an
authentication session. If you remove the configuration of the static VLAN used
to create a temporary client session, the 802.1X, MAC, or Web authenticated client
is deauthenticated.)
However, if a RADIUS-configured dynamic VLAN used for an authentication
session is deleted from the switch through normal GVRP operation (for example,
if no GVRP advertisements for the VLAN are received on any switch port),
authenticated clients using this VLAN are deauthenticated.
For information on how static and dynamic VLANs are assigned in a RADIUSbased 802.1X, MAC, or Web authentication session, refer to the “How RADIUSBased Authentication Affects VLAN Operation” section in the “RADIUS Authentication and Accounting” chapter of the Access Security Guide.
■
87
Enhancement (PR_1000413764) — Increase the size of the sysLocation and sysContact
entries from 48 to 255 characters. For more information, see “System Location and Contact
String Size Increase” below.
Enhancements
Release E.11.02 Enhancements
System Location and Contact String Size Increase
Configuring a System Contact and Location for the Switch
Both the system-contact and the system-location fields now allow up to 255 characters.
Syntax: snmp-server [contact <system-contact>] [location <system-location>]
For example, enter “George_Johnson” as the system contact, and “North-Data-Room” as the location.
Enter the show system-information command to see the names displayed.
ProCurve Switch 5300xl
5406zl(config)# show system-information
Status and Counters - General System Information
System Name
System Contact
System Location
: Blue Switch
: George_Johnson
: North-Data-Room
MAC Age Time (sec) : 300
Time Zone
: 0
Daylight Time Rule : None
Software revision
ROM Version
: E.11.03
K.12.06
: E.05.05
K.11.03
Base MAC Addr
Serial Number
: 001279-898c00
: SG344PN01G
Up Time
CPU Util (%)
: 45 hours
: 13
Memory
- Total
Free
: 150,585,184
: 110,215,280
Packet
Buffers
- Total
Free
Lowest
Missed
:
:
:
:
IP Mgmt
- Pkts Rx : 729,403
Pkts Tx : 2875
6750
5086
5030
0
Figure 9. System Information Listing
Menu Interface
The menu interface will only display up to 47 characters although you can specify a name up to 255
characters in length. A message beginning with “+” displays if the name exceeds 47 characters. You
can use the CLI show running, show config, or show system-information commands to see the complete
text. The menu interface is shown in Figure 10.
88
Enhancements
Release E.11.02 Enhancements
MENU
24-Oct-2007 12:41:47
ProCurve Switch 5406zl
24-Oct-2006
5300xl
===========================- TELNET - MANAGER MODE ===========================
Switch Configuration - System Information
System Name : Blue Switch
System Contact : Bill_Smith
System Location : + characters of the location are missing. It’s too long.
Inactivity Timeout (min) [0] : 0
Inbound Telnet Enabled [Yes] : Yes
Time Sync Method [None] : TIMEP
TimeP Mode [Disabled] : Disabled
MAC Age Time (sec) [300] : 300
Web Agent Enabled [Yes] : Yes
Tftp-enable [Yes] : Yes
Time Zone [0] : 0
Daylight Time Rule [None] : None
Actions->
Cancel
Edit
Save
Help
Cancel changes and return to previous screen.
Use arrow keys to change action selection and <Enter> to execute action.
Figure 10. Menu Screen Showing System Information
Web Browser Interface
The Web Browser interface also allows you to enter a maximum of 255 characters. You can view all
the characters by using the cursor to scroll through the field.
89
Enhancements
Release E.11.02 Enhancements
5304xl
Figure 11. System Location and System Contact in the Web Browser
■
Enhancement (PR_1000419653) — The show VLAN ports command was enhanced to
display each port in the VLAN separately, display the friendly port name (if configured), and
display the VLAN mode (tagged/untagged) for each port. For more information, see “Show
VLAN ports CLI Command Enhancement” below.
Show VLAN ports CLI Command Enhancement
The show vlan ports command has been enhanced with an option (detail) to display VLAN memberships on a per-port basis when a range of ports is specified in the command. In addition, user-specified
port names will be displayed (if assigned), along with tagged or untagged membership modes.
Displaying the VLAN Membership of One or More Ports
This command shows VLAN memberships associated with a port or a group of ports.
Syntax show vlan ports < port-list > [detail]
Displays VLAN information for an individual port or a group of ports, either
cumulatively or on a detailed per-port basis.
port-list: Specify a single port number, a range of ports (for example, a1-a16), or all.
detail: Displays detailed VLAN membership information on a per-port basis.
Descriptions of items displayed by the command are provided below.
Port name: The user-specified port name, if one has been assigned.
90
Enhancements
Release E.11.02 Enhancements
VLAN ID: The VLAN identification number, or VID.
Name: The default or specified name assigned to the VLAN. For a static VLAN, the
default name consists of VLAN-x where “x” matches the VID assigned to that VLAN.
For a dynamic VLAN, the name consists of GVRP_x where “x” matches the
applicable VID.
Status:
Port-Based: Port-Based, static VLAN
Protocol: Protocol-Based, static VLAN
Dynamic: Port-Based, temporary VLAN learned through GVRP.
Voice: Indicates whether a (port-based) VLAN is configured as a voice VLAN.
Jumbo: Indicates whether a VLAN is configured for Jumbo packets. For more on
jumbos, refer to the chapter titled “Port Traffic Controls” in the Management and
Configuration Guide for your switch.
Mode: Indicates whether a VLAN is tagged or untagged.
The following examples illustrate the displayed output depending on whether the detail option is
used.
ProCurve# show vlan ports a1-a33
Status and Counters - VLAN Information - for ports A1-A33
VLAN ID
------1
10
20
33
Name
----------------DEFAULT_VLAN
VLAN_10
VLAN_20
GVRP_33
|
+
|
|
|
|
Status
---------Port-based
Port-based
Protocol
Dynamic
Voice
----No
Yes
No
No
ProCurve#
Figure 12. Example of “Show VLAN Ports” Cumulative Listing
91
Jumbo
----No
No
No
No
Enhancements
Release E.11.02 Enhancements
ProCurve# show vlan ports a1-a4 detail
Status and Counters - VLAN Information - for ports A1
Port name: Voice_Port
VLAN ID Name
------- ----------------1
DEFAULT_VLAN
10
VLAN_10
|
+
|
|
Status
---------Port-based
Port-based
Voice
----No
Yes
Jumbo
----No
No
Mode
-----Untagged
Tagged
Status and Counters - VLAN Information - for ports A2
Port name: Uplink_Port
VLAN ID Name
------- ----------------1
DEFAULT_VLAN
20
VLAN_20
33
GVRP_33
|
+
|
|
|
Status
---------Port-based
Protocol
Dynamic
Voice
----No
No
No
Jumbo
----No
No
No
Mode
-----Untagged
Tagged
Tagged
Status and Counters - VLAN Information - for ports A3
VLAN ID
Name
| Status
+
Voice Jumbo Mode
Figure 13. Example of “Show VLAN Ports” Detail Listing
■
Enhancement (PR_1000412747) — TACACS+ single sign-on for administrators is now
supported. For more information, see “Configuring the Privilege-Mode Option” below.
Configuring the Privilege-Mode Option
The aaa authentication command configures access control for the following access methods:
■
Console
■
Telnet
■
SSH
■
Web
■
Port-access (802.1X)
However, TACACS+ authentication is only used with the console, Telnet, or SSH access methods.
The command specifies whether to use a TACACS+ server or the switch’s local authentication, or
(for some secondary scenarios) no authentication (meaning that if the primary method fails, authentication is denied). The command also reconfigures the number of access attempts to allow in a
session if the first attempt uses an incorrect username/password pair.
92
Enhancements
Release E.11.02 Enhancements
Using the Privilege-Mode Option for Login
When using TACACS+ to control user access to the switch, you must first login with your username
at the Operator privilege level using the password for Operator privileges, and then login again with
the same username but using the Manger password to obtain Manager privileges. You can avoid this
double login process by entering the privilege-mode option with the aaa authentication login
command to enable TACACS+ for a single login. The switch authenticates your username/password,
then requests the privilege level (Operator or Manager) that was configured on the TACACS+ server
for this username/password. The TACACS+ server returns the allowed privilege level to the switch.
You are placed directly into Operator or Manager mode, depending on your privilege level.
ProCurve(config) aaa authentication login privilege-mode
The no version of the above command disables TACACS+ single login capability.
■
Enhancement (PR_1000428642) — The SNMP v2c describes two different notification
type PDUs: traps and informs. Prior to this software release, only the trap’s sub-type was
supported. This enhancement adds support for informs. For more information, see “Send
SNMP v2c Informs” below.
Send SNMP v2c Informs
Enabling and Configuring SNMP Informs
You can use the snmp-server informs command (SNMPv2c and SNMPv3 versions) to send notifications
when certain events occur. When an SNMP Manager receives an informs request, it can send an SNMP
response back to the sending agent. This lets the agent know that the informs request reached its
destination and that traps can be sent successfully to that destination.
Informs requests can be sent several times until a response is received from the SNMP manager or
the configured retry limits are reached. The request may also timeout.
To enable SNMP informs, enter this command:
Syntax: [no] snmp-server enable informs
Enables or disables the informs option for SNMP.
Default: Disabled
To configure SNMP informs request options, use the following commands.
Syntax:
[no] snmp-server informs [retries<retries>] [timeout<seconds>] [pending <pending>]
Allows you to configure options for SNMP informs requests.
retries: Maximum number of times to resend an informs request. Default: 3
timeout: Number of seconds to wait for an acknowledgement before resending the
informs request. Default: 30 seconds
93
Enhancements
Release E.11.02 Enhancements
pending: Maximum number of informs waiting for acknowledgement at any one
time. When the maximum configured number is reached, older pending informs
are discarded. Default: 25
To specify the manager that receives the informs request, use the snmp-server host command.
Syntax: snmp-server host < ip-address >[<traps | informs>] [version <1 | 2c | 3>]< community-string >
Using community name and destination IP address, this command
designates a destination network-management station for receiving SNMP
event log messages from the switch. If you do not specify the event level,
then the switch does not send event log messages as traps. You can specify
up to 10 trap receivers (network management stations).
Note: In all cases, the switch sends any threshold trap(s) or informs to the
network management station(s) that explicitly set the threshold(s).
[traps | informs>]
Select whether SNMP traps or informs are sent to this management station.
[version <1 | 2c | 3>]
Select the version of SNMP being used.
Note: SNMP informs are supported on version 2c or 3 only.
[<none | all | non-info | critical | debug>]
Options for sending switch Event Log messages to a trap receiver. The levels
specified with these options apply only to Event Log messages, and not to
threshold traps.
You can see if informs are enabled or disabled with the show snmp-server command as shown in Figure
14.
94
Enhancements
Release E.11.02 Enhancements
ProCurve(config)# show snmp-server
SNMP Communities
Community Name
MIB View Write Access
---------------- -------- -----------public
Manager Unrestricted
Trap Receivers
Link-Change Traps Enabled on Ports [All] : All
Send Authentication Traps [No] : No
Informs [Yes] : Yes
Address
| Community
Events Sent in Trap
---------------------- ---------------- -----------------Excluded MIBs
Snmp Response Pdu Source-IP Information
Selection Policy
: Default rfc1517
Trap Pdu Source-IP Information
Selection Policy
: Default rfc1517
Figure 14. Example Showing SNMP Informs Option Enabled
■
Enhancement (PR_1000428213) — This software enhancement adds the ability to
configure a secondary authentication method to be used when the RADIUS server is
unavailable for the primary port access method. For more information, see “RADIUS Server
Unavailable” below.
RADIUS Server Unavailable
Overview
In certain situations, RADIUS servers can become isolated from the network. Users are not able to
access the network resources configured with RADIUS access protection and are rejected. To
address this situation, configuring the “authorized” secondary authentication method allows users
unconditional access to the network when the primary authentication method fails because the
RADIUS servers are unreachable.
Configuring RADIUS Authentication
You can configure the switch for RADIUS authentication through the following access methods:
95
Enhancements
Release E.11.02 Enhancements
■
Console: Either direct serial-port connection or modem connection.
■
Telnet: Inbound Telnet must be enabled (the default).
■
SSH: To use RADIUS for SSH access, first configure the switch for SSH operation.
■
Web: Enables RADIUS authentication for web browser interface access to the switch.
You can configure radius as the primary password authentication method for the above access
methods. You also need to select either local, none, or authorized as a secondary, or backup, method..
Syntax: aaa authentication < console | telnet | ssh | web > < enable | login > radius
Configures RADIUS as the primary password authentication method for console, Telnet,
SSH, and the web browser interface. (The default primary < enable | login > authentication is local.)
[< local | none | authorized >]
Provides options for secondary authentication (default: none).
Caution
Configuring authorized as the secondary authentication method used when there is a failure accessing
the RADIUS servers allows clients to access the network unconditionally. Use this method with care.
You can configure local, chap-radius or eap-radius as the primary password authentication method
for the port-access method. You also need to select none or authorized as a secondary, or backup,
method.
Syntax: aaa authentication port-access <chap-radius |eap-radius | local>
Configures local, chap-radius, or eap-radius as the primary password authentication
method for port-access. The default primary authentication is local.
[<none | authorized >]
Provides options for secondary authentication. The none option specifies
that a backup authentication method is not used. The authorized option
allows access without authentication. (default: none).
96
Enhancements
Release E.11.02 Enhancements
You can configure chap-radius as the primary password authentication method for web-based or macbased port-access methods. You also need to select none or authorized as a secondary, or backup,
method.
Syntax: aaa authentication <mac-based | web-based> chap-radius
Configures chap-radius as the primary password authentication method for mac-based
or web-based port access.
[<none | authorized >]
Provides options for secondary authentication. The none option specifies
that a backup authentication method is not used. The authorized option
allows access without authentication. (default: none).
Figure 1 shows an example of the show authentication command displaying authorized as the secondary authentication method for port-access, Web-auth access, and Mac-auth access. Since the configuration of authorized means no authentication will be performed and the client has unconditional
access to the network, the “Enable Primary” and “Enable Secondary” fields are not applicable (N/A).
ProCurve(config)# show authentication
Status and Counters - Authentication Information
Login Attempts : 3
Respect Privilege : Disabled
Access Task
----------Console
Telnet
Port-Access
Webui
SSH
Web-Auth
MAC-Auth
|
|
+
|
|
|
|
|
|
|
Login
Primary
---------Local
Local
Local
Local
Local
ChapRadius
ChapRadius
Login
Secondary
---------None
None
Authorized
None
None
Authorized
Authorized
Enable
Primary
---------Local
Local
N/A
Local
Local
N/A
N/A
Enable
Secondary
---------None
None
N/A
None
None
N/A
N/A
The access methods
with secondary
authentication
configured as authorized
allows the client access
to the network even if the
RADIUS server is
unreachable.
Figure 15. Example of AAA Authentication Using Authorized for the Secondary Authentication Method
Specifying the MAC Address Format
The MAC address format command has been enhanced to allow upper-case letters to be used for the
hexadecimal numbers when indicating the MAC address in RADIUS packets for MAC-based authentication.
Syntax:
97
aaa port-access mac-based addr-format <no-delimiter | single-dash | multi-dash | multi-colon |
no-delimiter-uppercase | single-dash-uppercase | multi-dash-uppercase |
multi-colon-uppercase>
Enhancements
Release E.11.02 Enhancements
Specifies the MAC address format to be used in the RADIUS request message.
This format must match the format used to store the MAC addresses in the
RADIUS server. (Default: no-delimiter)
no-delimiter — specifies an aabbccddeeff format.
single-dash — specifies an aabbcc-ddeeff format.
multi-dash — specifies an aa-bb-cc-dd-ee-ff format.
multi-colon — specifies an aa:bb:cc:dd:ee:ff format.
no-delimiter-uppercase — specifies an AABBCCDDEEFF format.
single-dash-uppercase — specifies an AABBCC-DDEEFF format
multi-dash-uppercase — specifies an AA-BB-CC-DD-EE-FF format
multi-colon-uppercase — specifies an AA:BB:CC:DD:EE:FF format.
For example, using the multi-colon-uppercase option, the MAC address would appear as follows:
AA:BB:CC:DD:EE:FF
■
Enhancement (PR_1000443349) — This enhancement is to allow the concurrent use of
SFTP with TACACS+ authentication for SSH connections. For more information, see
“Concurrent TACACS+ and SFTP” below.
Concurrent TACACS+ and SFTP
It is now possible to have SFTP/SCP sessions run concurrently with TACACS+ authentication.
Because the initial login must be with a username/password that has manager level privileges, you
must configure TACACS+ single sign--on in order for TACACS+ and SFTP/SCP to coexist.
To configure TACACS+ single sign-on, user the aaa authentication login privilege-mode command.
Syntax: aaa authentication
<login [privilege-mode] >
Selects the Operator access level. If the privilege-mode option is entered,
TACACS+ is enabled for a single login. The authorized privilege level
(Operator or Manager) is granted by the TACACS+ server.
Default: Single login disabled.
98
Enhancements
Release E.11.02 Enhancements
■
Enhancement (PR_1000457691) — This enhancement allows the mapping of all theoretically available VLAN IDs (1-4094) to an MSTP instance, even if some of the VLANs are not
currently configured on the switch. For more information, see “MSTP VLAN Configuration
Enhancement” below.
MSTP VLAN Configuration Enhancement
The Multiple Spanning Tree Protocol (MSTP) VLAN Configuration enhancement allows you to preconfigure an MSTP regional topology and ensure that the same VLAN ID-to MST instance (MSTI)
assignments exist on each MSTP switch in the region.
The default behavior of the spanning-tree instance VLAN command changes so that, before a static
VLAN is configured or a dynamic VLAN is learned on the switch, you can pre-configure its VLAN IDto-MSTI mapping. Later, when the VLAN is created, it is automatically assigned to the MSTI to which
you had previously mapped it.
Benefits
By supporting pre-configured VLAN ID-to-MSTI topologies, the VLAN Configuration enhancement
provides the following benefits:
■
Scalability: In a network design in which you plan to use a large number of VLANs, you can
pre-configure identical VLAN ID-to-MSTI mappings on all switches in a single, campus-wide
MST region, regardless of the specific VLANs that you later configure on each switch. After
the initial VLAN ID-to-MSTI mapping, you can decide on the exact VLANs that you need on
each switch.
All switches in a region must be configured with the same VLAN ID-to-MSTI mappings and the
same MST configuration identifiers (region name and revision number).
■
Flexibility: By pre-configuring identical VLAN ID-to-MSTI mappings on all switches in an
MST region, you can combine switches that support different maximum numbers of VLANs.
■
Network stability: You can reduce the interruptions in network connectivity caused by the
regeneration of spanning trees in the entire network each time a configuration change in
VLAN-to-MSTI mapping is detected on a switch. The negative impact on network
performance is reduced if all newly created VLANs are pre-mapped to the correct MST
instances. Later, VLAN creation and deletion are ignored by MSTP and no interruption in
spanning-tree traffic occurs.
■
Usability: Dynamically learned GVRP VLANs can be mapped to MSTIs and support MSTP
load balancing.
Pre-configuring VLANs in an MST Instance
When you configure an MSTP regional topology, you create multiple spanningtree instances. Each
MST instance provides a fully connected active topology for a particular set of VLANs.
99
Enhancements
Release E.11.02 Enhancements
Each switch in an MSTP region is configured with the following set of common parameters:
■
Region name (spanning-tree config-name)
■
Region revision number (spanning-tree config-revision)
■
Identical VLAN ID-to-MSTI mapping (spanning-tree instance vlan)
Each MST instance supports a different set of VLANs. A VLAN that is mapped to an MST instance
cannot be a member of another MST instance.
The MSTP VLAN Configuration enhancement allows you to ensure that the same VLAN ID-to-MSTI
assignments exist on each MSTP switch in a region. Before a static VLAN is configured or a dynamic
VLAN is learned on the switch, you can use the spanning-tree instance vlan command to map VLANs
to each MST instance in the region. Later, when the VLAN is created, the switch automatically assigns
it to the MST instance to which you had previously mapped it.
Syntax: [no] spanning-tree instance <1..16> vlan <vid [vid ..vid]>
no spanning-tree instance <1..16>
Operating Notes
■
Configuring MSTP on the switch automatically configures the Internal Spanning Tree (IST)
instance and places all statically and dynamically configured VLANs on the switch into the
IST instance. The spanning-tree instance vlan command creates a new MST instance and
moves the VLANs you specify from the IST to the MSTI.
You must map at least one VLAN ID to an MSTI when you create it. You cannot map a VLAN ID
to more than one instance. You can create up to 16 MSTIs in a region.
■
The no form of the spanning-tree instance vlan command removes one or more VLANs from
the specified MSTI. If no VLANs are specified, the no form of the command deletes the
specified MSTI. When you remove a VLAN from an MSTI, the VLAN returns to the IST
instance, where it can remain or be re-assigned to another MSTI configured in the region.
■
If you enter the spanning-tree instance vlan command before a static or dynamic VLAN is
configured on the switch to preconfigure VLAN ID-to-MSTI mappings, no error message is
displayed. Later, each newly configured VLAN that has already been associated with an MSTI
is automatically assigned to the MSTI.
This new default behavior differs from automatically including configured (static and dynamic)
VLANs in the IST instance and requiring you to manually assign individual static VLANs to an
MSTI.
■
The valid VLAN IDs that you can map to a specified MSTI are from 1 to 4094. The VLAN IDto-MSTI mapping does not require a VLAN to be already configured on the switch. The MSTP
VLAN enhancement allows you to preconfigure MSTP topologies before the VLAN IDs
associated with each instance exist on a switch.
100
Enhancements
Release E.11.02 Enhancements
■
When you use preconfigured VLAN ID-to-MSTI topologies, ensure that MSTP switches
remain in the same region by mapping all VLAN IDs used in the region to the same MSTIs on
each regional switch.
■
When you upgrade switch software to release E.11.03 and later, the existing MSTP topology
configuration is automatically saved. All existing VLAN ID-to-MSTI assignments are
maintained on a switch for uninterrupted MSTP network operation.
■
Enhancement (PR_1000401306) — The Reload "IN/AT" feature allows reload at a specified time or after a specified time interval. For more information, see “Rebooting and
Reloading the Switch” below.
Rebooting and Reloading the Switch
The switch offers reboot options through the boot and reload commands, plus the options inherent
in a dual-flash image system. Generally, using boot provides more comprehensive self-testing; using
reload gives you a faster reboot time.
Rebooting from the Current Software Version. Reload reboots the switch from the flash image
and startup-config file on which the switch is currently running, and provides the option for saving
to the startup-config file any configuration changes currently in the running-config file. Because
reload bypasses some subsystem self-tests, the switch reboots faster than if you use either of the
boot command options.
Syntax: reload
For example, if you change the number of VLANs the switch supports, you must reboot the switch
in order to implement the change. Reload automatically saves your configuration changes and
reboots the switch from the same software image you have been using:
Scheduled Reload. Beginning with software release K.11.34, additional parameters have been added
to the reload command to allow for a scheduled reboot of the switch via the CLI.
Syntax: reload [after <[dd:]hh:]mm> | at <hh:mm[:ss]> [<mm/dd[/[yy]yy]]>] | cancel]
Enables a scheduled warm reboot of the switch. Parameters include:
•
after: Schedules a warm reboot of the switch after a given amount of time has passed.
•
at: Schedules a warm reboot of the switch at a given time.
•
cancel: Removes a pending reboot request.
The scheduled reload feature supports the following capabilities:
■
101
It removes the requirement to physically reboot the switch at inconvenient times (for
example, at 1:00 in the morning). Instead, a reload at 1:00 mm/dd command can be executed
(where mm/dd is the date the switch is scheduled to reboot).
Enhancements
Release E.11.02 Enhancements
■
It provides a safety net in situations where a change is made from a remote location to the
running config that inadvertently causes loss of management access. For example, a newly
configured ACL might deny access to the switch from the management station’s IP address
such that the TELNET session ceases to function. Scheduling a reload after command
(timed to execute after the necessary configuration work is completed) will ensure that the
switch will reboot automatically. Assuming the ACL changes were not saved to the startup
config, TELNET access will then be restored. If the ACL work is completed successfully,
with no loss of access, the scheduled reboot can be cancelled with the reload cancel
command.
Examples
To schedule a reload in 15 minutes:
ProCurve# reload after 15
To schedule a reload in 3 hours:
ProCurve# reload after 03:00
To schedule a reload for the same time the following day:
ProCurve# reload after 01:00:00
To schedule a reload for the same day at 12:05:
ProCurve# reload at 12:05
To schedule a reload on some future date:
ProCurve# reload at 12:05 01/01/2007
Operating Notes
Default Boot Source. The switch reboots from primary flash by default unless you specify the
secondary flash.
Boot Attempts from an Empty Flash Location. In this case, the switch aborts the attempt and
displays:
Image does not exist
Operation aborted.
Interaction of Primary and Secondary Flash Images with the Current Configuration. The switch has
one startup-config file, which it always uses for reboots, regardless of whether the reboot is from
primary or secondary flash. Also, for rebooting purposes, it is not necessary for the software image
and the startup-config file to support identical software features. For example, suppose you have just
downloaded a software upgrade that includes new features that are not supported in the software
102
Enhancements
Release E.11.03 Enhancements
you used to create the current startup-config file. In this case, the software simply assigns factorydefault values to the parameters controlling the new features. Similarly, if you create a startup-config
file while using a version “Y” of the switch software, and then reboot the switch with an earlier
software version “X” that does not include all of the features found in “Y”, the software simply ignores
the parameters for any features that it does not support.
Scheduled Reload. If no parameters are entered after the reload command, an immediate reboot
is executed. The reload at and reload after command information is not saved across reboots. If
the switch is rebooted before a scheduled reload command is executed, the command is effectively
cancelled.
When entering a reload at or reload after command, a prompt will appear to confirm the command
before it can be processed by the switch. For the reload at command, if mm/dd/yy are left blank,
the current day is assumed.
Release E.11.03 Enhancements
Release E.11.03 contains software fixes only, no new enhancements.
Release E.11.04 Enhancements
Release E.11.04 contains software fixes only, no new enhancements (Not a public release).
Release E.11.05 Enhancements
Release E.11.05 contains software fixes only, no new enhancements (Never released).
Release E.11.06 Enhancements
Release E.11.06 contains software fixes only, no new enhancements (Not a public release).
Release E.11.07 Enhancements
Release E.11.07 contains software fixes only, no new enhancements (Never released).
103
Enhancements
Release E.11.08 Enhancements
Release E.11.08 Enhancements
Release E.11.08 includes the following enhancement (Never released):
■
Enhancement (PR_0000010783) — Support is added for the following products.
J9099B - ProCurve 100-BX-D SFP-LC Transceiver
J9100B - ProCurve 100-BX-U SFP-LC Transceiver
J9142B - ProCurve 1000-BX-D SFP-LC Mini-GBIC
J9143B - ProCurve 1000-BX-U SFP-LC Mini-GBIC
Release E.11.09 Enhancements
Release E.11.09 contains software fixes only, no new enhancements.
Release E.11.10 Enhancements
Release E.11.10 contains software fixes only, no new enhancement.
Release E.11.11 Enhancement
Release E.11.11 includes the following enhancement (not a public release).
■
Enhancement (PR_0000008911) — This enhancement allows an SFP (mini-GBIC) slot to
be configured even when there is no SFP/Mini-GBIC installed in the slot.
Configuring Transceivers
A miniGBIC port can be enabled and disabled, without having to physically insert the transceivers.
By default all ports, including miniGBIC ports, are enabled.
Disabling the MiniGBIC Port When Transceiver Is Not Inserted
To disable the miniGBIC port when the transceiver is not inserted, enter the interface context, then
enter the disable command:
ProCurve(config)# interface D1
ProCurve(eth-D1)# disable
Display the results using the show interfaces brief command.
104
Enhancements
Release E.11.11 Enhancement
ProCurve(config)# show interfaces brief
Status and Counters - Port Status
Port
----C23
C24
D1
D2
Type
--------10/100TX
10/100TX
|
|
+
|
|
|
|
Intrusion
Alert
--------No
No
No
No
Enabled
------Yes
Yes
No
Yes
Status
-----Down
Down
Down
Down
Mode
---------10FDx
10FDx
MDI
Mode
----Auto
Auto
Auto
Auto
Flow
Ctrl
----off
off
off
off
Figure 16. Example of Resulting Configuration When Disabling an Empty MiniGBIC Port
Enabling the MiniGBIC Port When Transceiver Is Not Inserted
To enable the miniGBIC port when the transceiver is not inserted, enter the interface context, then
enter the enable command:
ProCurve(config)# interface D1
ProCurve(eth-D1)# enable
ProCurve(config)# show interfaces brief
Status and Counters - Port Status
Port
----C23
C24
D1
D2
Type
--------10/100TX
10/100TX
|
|
+
|
|
|
|
Intrusion
Alert
--------No
No
No
No
Enabled
------Yes
Yes
Yes
Yes
Status
-----Down
Down
Down
Down
Mode
---------10FDx
10FDx
MDI
Mode
----Auto
Auto
Auto
Auto
Flow
Ctrl
----off
off
off
off
Figure 17. Example of Resulting Configuration When Enabling an Empty MiniGBIC Port
Disabling the MiniGBIC Port When Transceiver Is Inserted
Figure 18 displays the configuration of miniGBIC port D2 when the transceiver is physically inserted:
105
Enhancements
Release E.11.11 Enhancement
ProCurve(config)# show interfaces brief
Status and Counters - Port Status
Port
----C23
C24
D1
D2
Type
--------10/100TX
10/100TX
1000SX
|
|
+
|
|
|
|
Intrusion
Alert
--------No
No
No
No
Enabled
------Yes
Yes
Yes
Yes
Status
-----Down
Down
Down
Up
Mode
---------10FDx
10FDx
1000FDx
MDI
Mode
----Auto
Auto
Auto
NA
Flow
Ctrl
----off
off
off
off
Figure 18. Example of Configuration When Transceiver is Inserted in MiniGBIC Port
When the miniGBIC port is manually disabled, its operational status is also Down.
ProCurve(config)# show interfaces brief
Status and Counters - Port Status
Port
----C23
C24
D1
D2
Type
--------10/100TX
10/100TX
1000SX
|
|
+
|
|
|
|
Intrusion
Alert
--------No
No
No
No
Enabled
------Yes
Yes
Yes
No
Status
-----Down
Down
Down
Down
Mode
---------10FDx
10FDx
1000FDx
MDI
Mode
----Auto
Auto
Auto
NA
Flow
Ctrl
----off
off
off
off
Figure 19. Example of Configuration When MiniGBIC Port is Manually Disabled
Other Configurations Allowed on Empty MiniGBIC Ports
The following features can also be configured on empty miniGBIC ports:
•
enable
•
lacp passive
•
disable
•
link-keepalive
•
flow-control
•
mirror-port
•
bandwidth-min output
•
monitor
•
arp-protect trust
•
name
•
gvrp join-timer
•
rate-limit icmp
•
gvrp leaveall-timer
•
rate-limit all
•
gvrp leave-timer
•
tagged
•
lacp active
•
untagged
106
Enhancements
Release E.11.12 through E.11.15 Enhancements
The features mdix-mode and speed-duplex cannot be configured on empty miniGBIC ports.
Release E.11.12 through E.11.15 Enhancements
Release E.11.12 through E.11.15 contain software fixes only, no new enhancements (not public
releases).
Release E.11.16 Enhancement
Release E.11.16 includes the following enhancement (not a public release).
■
Enhancement (PR_0000041022) — Enhancement to AAA accounting.
Accounting Services
RADIUS accounting collects data about user activity and system events and sends it to a RADIUS
server when specified events occur on the switch, such as a logoff or a reboot.
Accounting Service Types
The switch supports four types of accounting services:
■
Network accounting: Provides records containing the information listed below on clients
directly connected to the switch and operating under Port-Based Access Control (802.1X):
•
•
•
•
•
•
■
•
•
•
•
•
•
Acct-Output-Packets
Acct-Input-Octets
Nas-Port
Acct-Output-Octets
Acct-Session-Time
User-Name
•
•
•
•
Service-Type
NAS-IP-Address
NAS-Identifier
Calling-Station-Id
Exec accounting: Provides records holding the information listed below about login
sessions (console, Telnet, and SSH) on the switch:
•
•
•
•
107
Acct-Session-Id
Acct-Status-Type
Acct-Terminate-Cause
Acct-Authentic
Acct-Delay-Time
Acct-Input-Packets
Acct-Session-Id
Acct-Status-Type
Acct-Terminate-Cause
Acct-Authentic
•
•
•
•
Acct-Delay-Time
Acct-Session-Time
User-Name
Service-Type
• NAS-IP-Address
• NAS-Identifier
• Calling-Station-Id
Enhancements
Release E.11.16 Enhancement
■
System accounting: Provides records containing the information listed below when system
events occur on the switch, including system reset, system boot, and enabling or disabling
of system accounting.
• Acct-Session-Id
• Acct-Status-Type
■
• Acct-Delay-Time
• NAS-IP-Address
• NAS-Identifier
Commands accounting: Provides records containing information on CLI command
execution during user sessions.
•
•
•
•
Acct-Session-Id
Acct-Status-Type
Service-Type
Acct-Authentic
•
•
•
•
User-Name
NAS-IP-Address
NAS-Identifier
NAS-Port-Type
• Calling-Station-Id
• HP-Command-String
• Acct-Delay-Time
The switch forwards the accounting information it collects to the designated RADIUS server, where
the information is formatted, stored, and managed by the server. For more information on this aspect
of RADIUS accounting, refer to the documentation provided with your RADIUS server.
Operating Rules for RADIUS Accounting
•
You can configure up to four types of accounting to run simultaneously: exec, system,
network, and command.
•
RADIUS servers used for accounting are also used for authentication.
•
The switch must be configured to access at least one RADIUS server.
•
RADIUS servers are accessed in the order in which their IP addresses were configured
in the switch. Use show radius to view the order. As long as the first server is accessible
and responding to authentication requests from the switch, a second or third server will
not be accessed.
•
If access to a RADIUS server fails during a session, but after the client has been
authenticated, the switch continues to assume the server is available to receive
accounting data. Thus, if server access fails during a session, it will not receive
accounting data transmitted from the switch.
Acct-Session-ID Options in a Management Session
The switch can be configured to support either of the following options for the accounting service
types used in a management session. (Refer to “Accounting Service Types” on page 107.)
■
unique Acct-Session-ID for each accounting service type used in the same management
session (the default)
■
same Acct-Session-ID for all accounting service types used in the same management session
108
Enhancements
Release E.11.16 Enhancement
Unique Acct-Session-ID Operation
In the Unique mode (the default), the various service types running in a management session operate
as parallel, independent processes. Thus, during a specific management session, a given service type
has the same Acct-Session-ID for all accounting actions for that service type. However, the AcctSession-ID for each service type differs from the ID for the other types.
Note
In Unique Acct-Session-ID operation, the Command service type is a special case in which the AcctSession-ID for each executed CLI command in the session is different from the IDs for other service
types used in the session and also different for each CLI command executed during the session. That
is, the ID for each successive CLI command in the session is sequentially incremented from the ID
value assigned to the immediately preceeding CLI command in that session.
109
Software Fixes
Release E.06.01
Software Fixes
Software fixes are listed in chronological order, oldest to newest.
Unless otherwise noted, each new release includes the software fixes added in all previous releases.
Release E.05.04 was the first software release for the ProCurve Series 5300xl switches.
Release E.06.01
Problems Resolved in Release E.06.01
■
100/1000-T module (PR_4956) — Bringing a port up and down while the port is running
at or near maximum throughput may cause the module to reset.
■
802.1x (PR_4972) — Support for 802.1x is not implemented in routing mode.
■
802.1x (PR_5043) — When changing an 802.1x port configuration, the switch does not
correctly restore default VLAN ID after disconnecting the port.
■
ARP (PR_4443) — Switch incorrectly replied to an ARP packet with a header length ranging
from 7 to 15 bytes. The switch now replies only if header length is equal to 6 bytes.
■
CDP (PR_4546) — CDP multicast packets are not passed through the switch when CDP is
disabled on the switch.
■
CLI/RIP (PR_5046) — The CLI command 'show ip rip interface' results in the following:
"RIP interface information for 0.0.0.0, RIP is not configured on this..."
■
CoS (PR_4738) — Cannot configure CoS on a trunk port. Also, enhancements to CoS error
handling when moving ports in and out of a trunk.
■
CoS (PR_4982) — The output of the CLI command “show qos port-priority” may show an
illegal state (“no priority”) for the Differentiated Services Codepoint (DSCP) policy. This
problem may occur given this situation:
1. Configure a DSCP policy on a port, and
2. Remove module, and
3. Reboot switch, and
4. Delete DSCP policy, and
5. Hot-swap module back into the switch
■
Crash (PR_4933) — Switch may crash while hot swapping a module with a message similar
to:
-> Software exception in ISR@alloc_free.c:479
110
Software Fixes
Release E.06.02
■
DHCP-Relay (PR_4551) — Configuring an IP helper address on a VLAN does not automatically turn on the DHCP-relay function.
■
Extended RMON (PR_5083) — When Extended RMON and Routing are enabled, the
switch may duplicate packets on the network.
■
LACP (PR_5000) — Link-up polling interval: A delay of up to 1.7 seconds between plugging
in a cable (linkbeat established) and traffic being forwarded to and from that port may cause
problems with some time sensitive applications. For example, AppleTalk dynamic address
negotiation can be affected, resulting in multiple devices using the same AppleTalk address.
■
Mini-GBIC Link Connectivity Issue (PR_4957) — A mini-GBIC Gigabit-SX/LX link
between an ProCurve Switch 5300xl and an ProCurve Routing Switch 9300 may not be
established when both sides are in the default configuration (Auto).
■
Radius (PR_4886) — If using the TAB key while entering a username for the radius prompt,
the switch may display an error message similar to:
->BAD CHARACTER IN ttyio_line: 0x9n
■
RIP (PR_4757) — After the switch reboots and if a routing loop (3 or more routers) exists
in the topology, RIP may age out its own connected routes (even though the routes are still
valid).
■
RIP (PR_4965) — Static routes are redistributed into RIP. [Fix: Static routes are no longer
redistributed into RIP by default, only directly connected routes are redistributed.] [Old
description: Changes to RIP route redistribution such that only connected routes are
redistributed, not static configured routes.
■
RIP (PR_4987) — If multiple IP addresses are configured for a VLAN and RIP is running
on one or more of the secondary addresses, the CLI command “show ip rip vlan x” will only
show information about the primary IP address.
■
Routing (PR_4977) — If a default route is not configured and the switch receives a Layer
3 packet with an unknown source address, the packet will be routed by software even though
an entry for the destination exists in the hardware routing table.
■
Static Routes (PR_5040) — Reject static routes could not be created.
■
Web Browser Interface (PR_4976) — The product Registration screen contains a typographical error. The phrase “...does not appears above...” is now “...does not appear above...”.
Release E.06.02
Problems Resolved in Release E.06.02
■
111
Performance (PR_5161) — Certain high traffic levels may cause the switch to drop
packets.
Software Fixes
Release E.06.03
Release E.06.03
Problems Resolved in Release E.06.03
■
Packets not Forwarded (PR_5201) — A synchronization issue between the switch chassis
and modules after several weeks of continuous operation can result in packets being dropped
by the switch instead of being forwarded.
Release E.06.05
Problems Resolved in Release E.06.05
■
Crash (PR_5471) — The CLI command “show ip ospf neighbor” may cause the switch to
crash with a message similar to:
Bus error: HW Addr=0x30008fa0 IP=0x001112a4 Task=’mSess1’ Task
ID=0x169b110
Release E.06.10
Problems Resolved in Release E.06.10
■
Crash (PR_5229) — Greater than 100 hot swaps causes mesg buff crash.
■
Flow Control (PR_5215) — Enabling Flow Control on a port does not enable Global Flow
Control on the switch.
■
Security (PR_5226) — Removed display of TACACS Server IP address during remote
management logon.
■
Security (PR_5227) — TCP Port 1506 access is closed when Telnet or Stacking is disabled.
■
Web-browser interface (PR_5052) — Executing the CLI command “no web-management”
does not disable access to the web-browser interface.
Release E.07.21
Problems Resolved in Release E.07.21
■
ARP (PR_5185) — ARP has been enhanced to have a configurable timeout value, beyond
the current default of 20 minutes.
■
CDP (PR_5054) — CDP multicasts are not passed when CDP is disabled on the switch.
■
CLI (PR_5053) — Setting the TELNET inactivity timeout from the CLI does not indicate a
reboot is necessary for changes to take effect.
112
Software Fixes
Release E.07.21
■
CLI (PR_4984) — The definition of default gateway following the “ip?” in the CLI is stated
as “Add/delete default route to/from routing tale.”, which is incorrect. Clarified help text for
'ip default-gateway' CLI command to state that this parameter is only used if routing is not
enabled on the switch.
■
CLI (PR_5242) — Information in the command “show boot-history” is not in the order
claimed (most recent first).
■
Crash (PR_4621) — The switch may crash with a message similar to:
NMI occurred: IP=0x00317d9c MSR:0x0000b000 LR:0x00013b88
Task='eDrvPollRx' Task ID=0x1708f20 cr: 0x22000080 sp:0x01708e60 xer:
■
Crash (PR_5745) — The switch may crash with a message similar to:
-> Divide by Zero Error: IP=0x801400c0 Task='sal_dpc_hi'
Task ID=0x80616690 fp:0x00000000 sp:0x80616600 ra:0x800140060
sr:0x1000af01
■
Crash (PR_5635) — The switch may crash with a message similar to:
-> Assertion failed:0, file drvmem.c,
■
line 167
Crash (PR_5679) — The switch may crash with a message similar to:
-> Bus error: HW Addr=0x00000000 IP=0x00000000 Task='mNSR' Task
ID=0x1725148 fp: 0x0000c4b0 sp:0x012e9780 lr:0x00330674
■
Crash (PR_5712) — The switch may crash with a message similar to:
-> TLB Miss: Virtual Addr=0x00000000 IP=0x8002432c Task='tSmeDebug'
■
Crash (PR_5725) — The switch may crash with a message similar to:
-> Assertion failed: nt, file dpc.c, line 169
■
Crash (PR_5846) — WhatsUpGold TELNET scan can cause switch to run out of memory
and crash with error message similar to:
-> malloc_else_fatal() ran out of memory
■
Crash (PR_5955) — The switch may crash with a message similar to:
Software exception at alpha_chassis_slot_sm.c:506
■
Crash (PR_4986) — The switch may crash with a message similar to:
-> Bus error: HW Addr=0x00ffffff IP=0x332c4530 Task='mSess1' Task
ID=0x16a62f0 fp: 0x2e2e2e29 sp:0x016a61a0 lr:0x0010f028
This crash can occur when eight transceiver modules are installed and the command “interface
all” is typed in the configuration context.
113
Software Fixes
Release E.07.21
■
Crash (PR_5418) — The switch may crash with a message similar to:
-> Software exception at rtsock.c:459 -- in 'tNetTask', task ID =
0x1a225b0
■
Crash (PR_5635) — The switch may crash with a message similar to:
-> Assertion failed:0, file drvmem.c,
■
line 167
Crash (PR_5341) — All three of the following steps must occur before the crash is
exhibited:
1. .A 1000-T port (without a link) is configured as a mirror destination port.
2. Another blade/port traffic is mirrored to that destination port.
3. Mirror destination port/blade will crash or hang after connecting, then disconnecting a 100T
link with a message similar to:
Software exception at nc_fd_fi.c:693 - in 'mPmSlvCtrl'task ID =
0x405e9cc8 -> netchip_FIOutboundFlush: Timeout reached!
■
Crash (PR_5236) — The switch may crash with a message similar to:
-> AlphaSlaveAddrmgr.p 1021 this time
This crash can occur when a module is hot-swapped after downloading new software to the
switch without rebooting.
■
Date/Time (PR_5264) — The timezone can cause the date to wrap if the timezone is set to
a valid, but negative value (like -720) without previously configuring the switch's time. The
switch may report an invalid year (i.e. 2126).
■
DHCP — If a client moves without first releasing its IP address, it will not receive a NAK,
resulting in the client’s inability to get an IP address at its new location.
■
Event Log (PR_5154) — When a module fails to download, the severity code is INFO
instead of WARNING.
■
Fault Finder/CLI (PR_4696) — Setting fault finder sensitivity always resets action
configuration to 'warn', when it should remain 'warn and disable'.
■
FFI/Port Counters (PR_5429) — No errors are reported by the FFI or port counters when
linking at 100 HDX on a Gigabit port with a duplex mismatch.
■
FFI/Port counters (PR_5280) — FFI and port counters don't have consistent values.
■
Filter (PR_5132) — Source port Filter on Dyn1 LACP trunk creates Multicast Filter entry
that cannot be deleted.
114
Software Fixes
Release E.07.21
■
Filter (PR_4833) — Creating a source port filter for a port, moving the port into a trunk,
and then reloading the saved TFTP configuration file results in a corrupted download file
error.
■
Flow Control (PR_5102) — Setting a port “X1” in 10-HDX, then attempting to turn on flow
control returns an error similar to: “Error setting value fl for port X2”. The error should read
“X1”.
■
GVRP (PR_5284) — Port does not register VLAN even though advertisements are received.
■
Hot-swap (PR_4900) — Hot-swapping a transceiver logs a message requesting to reboot
the switch in order to enable the port, which is not necessary.
■
IGMP (PR_5736) — If IGMP is turned on for multiple VLANs, and is then turned off for a
single VLAN, the Data-Driven Mcast filters for that VLAN are not flushed.
■
IP (PR_5408) — IP is causing the driver to apply source port filters incorrectly to nonrouted packets.
■
IRDP (PR_5923) — When running the 'rdisc' router discovery tool under Redhat 8.0 or 7.3,
Linux reports “ICMP Router Advertise from <IP>: Too short 16 40” when a IRDP packet is
received.
■
LACP/Port Security (PR_5059) — With LACP on, the command “port-sec a1 l c action
send-alarm” fails with a message similar to “learn-mode: Inconsistent value”.
■
Link Toggle Corruption (PR_5527) — Addressed issue whereby toggling ports with
active, bi-directional traffic could result in corrupted packets within the system.
■
Link-up Polling Interval (PR_5000) — A delay of up to 1.7 seconds between plugging in
a cable (linkbeat established) and traffic being forwarded to and from that port may cause
problems with some time sensitive applications. For example, AppleTalk dynamic address
negotiation can be affected, resulting in multiple devices using the same AppleTalk address.
■
Menu (PR_5346) — The one-line help text below the password entry field, displays the
message "Enter up to 16 characters (case sensitive), or just press
<Enter> to quit". It should read "…sensitive…".
■
Meshing (PR_4969) — Traffic on oversubscribed mesh links will migrate to other mesh
links too slowly.
■
Meshing (PR_4980) — Meshing does not maintain priority on encapsulated packets that
are sent out non-mesh ports.
■
Multicast Filters (PR_4741) — Any static multicast filters configured once the limit has
been reached, would appear in the output of the “show filter” CLI command with only partial
information. Switch now correctly returns error message “Unable to add filter” once limit
has been reached.
115
Software Fixes
Release E.07.21
■
OSPF (PR_88611) — When configured for authentication-key type “simple passwords”,
the switch does not include the password in OSPF packets.
■
Port Configuration (PR_5444) — When interchanging 10/100-TX modules J4862A and
J4862B, the port configuration of the module originally installed in the switch is lost.
■
Port counters (PR_5013) — Hardware port counter filters for dot1dTpPortInDiscards not
implemented.
■
Port counters (PR_5171) — The “Total RX Error” counter is incorrect when the port has
heavy 10HDx traffic.
■
Port counters (PR_5204) — The Runt Rx counter in the detail port counter screen, does
not increment when there are fragments.
■
Port counters (PR_5400) — The 64-bit counter for the highest numbered port on a given
module, does not update properly.
■
RADIUS (PR_4886) — Pressing the tab key gives error message similar to “BAD CHARACTER IN ttyio_line: 0x9n” when entering a username for the radius prompt.
■
RSTP (PR_5449) — There is a delay in the switch relearning MAC addresses when an RSTP
port transitions from Blocking to Forwarding.
■
Self Test (PR_5113) — There are intermittent port failures reported on ProCurve switch
xl 100/1000-T modules (J4821A) while performing a packet self test, which was due to the
packet test not seeing the very first packet.
■
SNMP (PR_5349) — The switch does not send SNMP packets larger than 484 bytes.
■
SNTP/TIMEP (PR_5018) — SNTP still runs when TIMEP is enabled.
■
Source Port Filters (PR_4669) — Source port filters for illegal ports and trunk port
members cannot be deleted from the CLI.
■
Source Port Filters (PR_4719) — The switch does not automatically remove a source
port filter for a trunk that has been deleted.
■
System Information (PR_5169) — Up Time displayed is not correct.
■
TACACS (PR_5226) — During TACACS Authentication the TACACS Server's IP address
is shown on the switch's 'splash screen'.
■
TCP (PR_5227) — TCP port 1506 is always open. Fix is to close TCP port 1506.
■
TFTP (PR_5034) — Trying to TFTP a config onto the switch causes the switch to not
complete its reload process. The switch hangs and does not come up.
■
VLANs (PR_4405) — The VIDs of deleted VLANs are not removed from the switch's VLAN
table, causing the switch to not allow new VLANs to be created (once the VID table is full).
116
Software Fixes
Release E.07.22
■
Web (PR_5455) — Bad URL was being mirrored back to the user following Nessus script
attack test.
■
Web-Browser Interface (PR_5199) — Having a ProCurve switch 4100gl series as a
commander, and a ProCurve switch 4000m as a member of the stack, the stack commander
was not checking security when doing passthrough.
■
Web-Browser Interface (PR_5052) — The CLI does not disable the web-browser interface.
■
Web-Browser Interface (PR_5055) — Missing firmware/ROM information in Web UI.
■
Web-Browser Interface (PR_5158) — When clicking on the Web UI System Info “Apply
Changes” button, a character appears under the “VLAN Configuration” tab.
■
Web-Browser Interface (PR_4976) — Mis-spelled word on the product registration
screen of the WEB UI. The phrase “...does not appears above...” is now “...does not appear
above...”
■
Web-Browser Interface (PR_4996) — When using a ProCurve Switch 4108 as a
commander switch in the stack, a ProCurve Switch 2424M is not shown in the device view
of the stack close-up in the web UI. The message “Device view, HP2424M, not supported by
firmware of commander” is present instead of the device view.
■
Web-Browser Interface (PR_4904) — When a transceiver is removed from the switch,
its configuration is not cleared on the Status->port status screen of the web UI. The
transceiver type will still show until a new transceiver is inserted.
■
Web-browser Interface (PR_4235) — Web-browser port utilization label does not display
the bandwidth number. Shows x% of 0Mb instead of x% of 100Mb or x% of 1Gb.
■
Web-Browser Interface (PR_4495 — Administrator password can be used in combination
with the operator username.
Release E.07.22
Problems Resolved in Release E.07.22
■
Meshing/Packet Buffer Depletion (PR_88694) — Certain mesh topologies may cause
packet buffers to be depleted on the switch. In this state the switch will generate an "Out
of pkt buffers" Event Log message.
■
OSPF (PR_88718) — In topologies where the switch has redundant routes (via a directly
connected link and via an OSPF learned route) to the same network, the switch does not
learn the alternate route via OSPF when the directly connected link goes down.
117
Software Fixes
Release E.07.27
■
Port Hang (Packet Not Forwarded) (PR_88613) — Under certain traffic load conditions, ports that are toggling on the mini-GBIC module (J4878A) may stop transmitting
packets.
Release E.07.27
Problems Resolved in Release E.07.27
■
Enhancement (PR_90365) — Modifications have been made to the switch meshing code
to allow limited mesh interoperability between E.07.x and pre-E.07.x software to allow easier
upgrades of all switches in a mesh. (Current implementation does not allow switches running
pre-E.07.x software to participate with meshed switches running E.07.x or greater.)
■
IGMP (PR_82491) — A Group-Specific Query (GSQ) timeout is currently .2 to .6 seconds,
rather than the specified default of 1 second.
■
IGMP (PR_90376) — In some cases, the switch would display “0.0.0.0” for the output of
the CLI command show ip igmp.
■
Meshing (PR_88689) — A 12-switch mesh may cause the switch to temporarily run out of
packet buffers.
■
Telnet (PR_82522) — Switch TELNET connections were not closed properly resulting in
new TELNET sessions being established which could result in the switch reaching its
maximum number (3) of TELNET sessions.
■
Web-Browser Interface (PR_82530) — A client using Sun java 1.3.X or 1.4.X to access
the Web-Browser Interface of the switch, may cause the switch's CPU utilization to increase
causing agent processes (such as console, TELNET, STP, ping, etc.) to stop functioning.
Release E.07.29
Problems Resolved in Release E.07.29
■
ACL (No PR) — The switch allows a user to execute a “no access-list” command for a nonexistent ACE without responding with an appropriate error message.
■
ACL (PR_90250) — Packets that match a “denied” ACL entry may cause the switch’s CPU
to run at full utilization.
■
ACL (PR_90415) — On ACL entries such as “permit/deny tcp any” the switch will incorrectly permit/deny UDP traffic. The same is inversely true for ACL entries such as “permit/
deny udp any” resulting in TCP traffic being permitted/denied.
■
ACL Performance (PR_90366) — Addressed potential performance issues of cached TCP
and UDP ACL entries.
118
Software Fixes
Release E.07.30
■
Config (PR_88753) — A 1000-FDX port setting in the switch config file is not processed
properly, resulting in Gigabit-SX ports remaining in an “auto” port configuration. This is most
often seen when reloading or TFTP’ing a config file to the switch.
■
Port-sec (PR_88612) — Static MAC addresses are set up under port security with learnmode “configure specific” to allow those MAC addresses to communicate through the switch.
If one of those MAC addresses is removed via the Web interface of the switch and then reentered, the owner of that MAC address cannot communicate through the switch.
■
Routing (PR_90554) — Cached routing information was only updated by IP routable
datagrams, and was not being updated by Layer-2 traffic such as ARP.
■
Self Test (PR_90777) — A self test error may occur when a Gigabit-SX, or LX mini-GBIC
module is inserted into the switch while powered on.
■
Spanning Tree (PR_90412) — Enhancements made to 802.1w operation to address version
3 BPDU communication issues.
Release E.07.30
Problems Resolved in Release E.07.30
■
Agent Performance (PR_81861) — The switch may get into a state where end nodes and
other network devices cannot contact (ping, TELNET, SNMP, etc.) the switch's agent.
■
Routing (PR_90802/91236) — The switch may route packets out the wrong port due to a
mismatch between the source and destination MAC addresses.
Release E.07.34
Problems Resolved in Release E.07.34
■
Agent Hang (PR_92802) — The switch may become unresponsive or hang due to UDP
port 1024 broadcast packets never being freed, after the TIMEP and SNTP clients are disabled
on the switch.
■
Crash (PR_92659) — Software exception at memrpt.c:1153 -- in 'mInstCtrl', task ID =
0x1455a30
■
IPv6 (PR_93171) — The switch does not forward IPv6 Router Solicitation/Advertisements
when IGMP is enabled.
■
Routing / Agent Performance (PR_95009) — Routing performance may be degraded due
to the aging of host route entries. In this scenario, traffic will be routed through the switch
software, thereby resulting in lower performance of routing and agent access (TELNET,
SNMP, ping, etc.) operations.
119
Software Fixes
Release E.07.37
■
VLAN (PR_92466) — The switch may experience a Bus error related to 802.1X/unauthorized VLAN. The Bus error is similar to:
Bus error: HW Addr=0x3861000c IP=0x002df470 Task='mAdMgrCtrl'Task
ID=0x16e616 0 fp: 0x006a090c sp:0x016e5df0 lr:0x0021d6d8
Release E.07.37
Problems Resolved in Release E.07.37
■
Crash (PR_90217) — The switch may crash under high stress in a very large mesh topology
with a message similar to:
Bus error: HW Addr=0x08040010 IP=0x002c8b48 Task='eDrvPoll' Task
ID=0x177fdb0 fp: 0x01682e38 sp:0x0177f9e8 lr:0x002c8ae0.
■
Crash (PR_90374) — The J4878A mini-GBIC module may cause the switch to crash with
a message similar to:
"Slot B SubSystem 0 went down: 01/01/90 13:05:41 Software exception at
dmaRx.c:211 -- in 'tDevPollRx', task ID = 0x40808b78 -> FAULTY INK
PARTNER CONNECTED ON SLOT".
■
Crash (PR_94852) — The switch may crash when in a mesh configuration with a message
similar to:
Bus error: HW Addr=0xdc37e837 IP=0x002c944c Task='eDrvPoll'
ID=0x173fdb0 fp: 0x01054468 sp:0x0173fa50 lr:0x002c93c0.
■
Task
Crash (PR_95284) — If a user enters an invalid MAC address during the Port Security
configuration within the CLI, the switch may crash with a message similar to:
Software exception at exception.c:345 -- in 'mSess1', task ID = 0x141ae70
-> Memory system error at 0x131b5a0 - memPartFree
■
Meshing (PR_96007) — If a mesh link is broken then shortly followed by the learning of
new MAC addresses, the switch may exhibit problems such as bus errors and/or improper
communication with other mesh switches.
■
SNMP (PR_96999) — When the switch is reset (or power-cycled) after configuring an
SNMP Community Name with “Operator/Restricted” Rights, it will still allow SNMP sets
(writes) to MIB objects.
Release E.07.40
Problems Resolved in Release E.07.40
120
Software Fixes
Release E.08.01
■
Agent Hang (PR_97705) — Agent processes (Ping, TELNET, SNMP, etc.) may stop
functioning.
■
ARP (PR_92421/93008/97993) — Default ARP aging time is 1,200 minutes when it should
be 20 minutes. User-configured ARP aging times do work correctly.
■
Crash (PR_95293) — The switch may crash with a message similar to:
Bus error: HW Addr=0x08000001 IP=0x00267cc4 Task='mIpAdMCtrl' Task
ID=0x150520 fp: 0x00000020 ip:0x01505100 lr:0x00267ca0
This crash has been associated with traffic patterns generated by the Blaster and Welchia worms.
■
Crash (PR_96236) — The switch may crash with a message similar to:
"Software exception at ipaddrmgrSCtrl.c:2108 -- in 'mIpAdMUpCt'"
■
Crash (PR_97048/97083) — The switch may crash with a message similar to:
Bus error: HW Addr=0x1bee13a8 IP=0x00267b68 Task='mIpAdMCtrl' Task
ID=0x14c2fe0 fp: 0x00000028 sp:0x014c2e98 lr:0x00267b58. In QA code:
Software exception at route.c:296. Attempt to free a null route.
■
Hang (PR_97031) — Switch may hang (routing and console) due to infinite loop issue in
ACL code.
■
Routing (PR_98494/97301) — The switch may exhibit slower-than-normal routing performance due to route entries not being aged properly.
■
Routing (PR_98847) — Under some conditions when there are more than 32 VLANs and
IGMP enabled, the switch may not route.
■
X-modem (PR_95748) — When trying to download a zero-length OS file to the switch, the
switch may crash with a message similar to:
Software exception at fileTransfer.c:552 -- in 'mftTask', task ID =
0x1241ca8 -> Could not open file.
Release E.08.01
Problems Resolved in Release E.08.01
■
ACL (PR_94945) — 5300 allows duplicate ACEs (Access Control Entries) to be entered
within an ACL.
■
CERT (PR_96648) — Applied OpenSSH patches to switch for CERT Advisory CA-2003-24
related problems.
121
Software Fixes
Release E.08.01
■
CLI (PR_81948) — There are currently two “enable” commands present within the “Interface Config” context; one is to enable the port, the other is to enter manager context. The
“enable” command is now filtered when not in the Operator Context within CLI.
■
CLI (PR_82475) — The help text displayed for source-route is incorrect when auto-extend
is applied to the command “IP”.
■
CLI (PR_90302) — The help text within CLI for the “Interfaces” command is grammatically
incorrect.
■
Crash (PR_88831) — The switch may crash with a message similar to:
02/27/03 15:48:09 Bus error: HW Addr=0x02000000 IP=0x0013866c
Task='mSess2' Task ID=0x1654700fp: 0x01654a40 sp:0x016533a0
lr:0x0013874
■
Crash (PR_1000002979) — The switch may crash with a message similar to:
Software exception at rstp_port_role_sm.c:44 -- in 'mRstpCtrl', task
ID = 0x1379a48-> ASSERT: failed
■
Crash (PR_1000003288) — The 10/100 Module (J4820A) under conditions of heavy port
toggling may crash with a message similar to:
Software exception @ dmaRx.c: 237.
■
Crash (PR_89847) — The switch may crash with a message similar to:
Software exception in ISR at alpha_hs_int.c:547
-> NCI_INTERRUPT_ERROR. Slot 3 NCI_IntReg=0x4000
■
Enhancement (PR_81844) — Enhancement to improve “Debug HELP” information
provided via CLI.
■
IP (PR_1000000728) — The switch does not notify the IP Address Manager when an RSTP
topology change occurs.
■
Logging (PR_82509) — The switch will reboot when an invalid IP address is assigned to
the logging feature, while “Logging” is turned off.
■
Meshing (PR_82502) — Improved meshing performance during network conditions when
there are large volumes of Port “learns” and “moves”.
■
Routing (PR_93205) — The switch incorrectly allows for a configuration in which a static
route can be configured as 127.x.x.x.
■
RSTP (PR_1000001612) — A port takes approximately 30 seconds to go into the
Forwarding state.
122
Software Fixes
Release E.08.03
■
Security (PR_90899) — After configuring a port to be "learn-mode configured", the "show
port security" output within the CLI lists "Static" as the learn mode, rather than “Configured”,
as it should be.
■
Security (PR_91855) — The switch may fail to forward authentication requests to a
RADIUS server when an unauthorized VID is configured and “Port-Security” is set to 802.1x.
■
Syslog (PR_91123) — The switch may fail to send messages to a configured Syslog server.
■
VLAN (PR_92426) — Unable to delete a VLAN by name if the name is numeric within the
CLI.
■
Web Agent (PR_82157) — There is a missing graphic in the upper left hand corner of the
“First time installation” pop up window.
■
Web UI (PR_90858) — Unable to clear the “VLAN Name” text field after 12 characters are
entered within the Web UI.
■
XRMON (PR_98199) — The “BroadcastPackets” counters for MIB object
1.3.6.1.2.1.16.1.1.1.6 on the 53xx series switch are incorrect.
Release E.08.03
Problems Resolved in Release E.08.03
■
Crash (PR_1000007148) — The switch may crash with a message similar to:
Bus error: HW Addr=0x7c7343b2 IP=0x002c3e54 Task='mIpAdMCtrl'.
■
Crash (PR_1000007227) — The switch may crash with a message similar to:
Software exception at alloc_free.c:485 -- in 'tDevPollTx', task ID =
0x17a3.
Release E.08.07
Problems Resolved in Release E.08.07
■
ACL (PR_1000006679) — The configured ACL “Range” parameter may not function
properly after a reboot.
■
CLI (PR_82086) — The command show mac <mac-address> does not function.
■
CLI (PR_ 1000000560) — The port security “Help” screen has been updated to include
learn mode "Limited-Continuous".
■
CLI (PR_1000004025) — After the switch is up for approximately 49 days, the “Up Time”
from the show system command will not be accurate.
123
Software Fixes
Release E.08.07
■
CLI (PR_1000095690) — Error message improved when a user enters an Interface Name
that is too long.
■
Crash (PR_1000004216) — The switch may crash with a message similar to:
Driver corrupted - Slave Bus Error: dmaTxPollPackets.c:724
■
Crash (PR_1000005210) — The switch may crash with a message similar to:
Exception in ISR at dmaRx.c:830
■
Crash (PR_1000005829) — The switch may crash with a message similar to:
Software exception at alphaHwRateLimits.c:84
■
Crash (PR_1000005902) — In cases where a heartbeat failure may occur, the switch will
provide more specific and informative crash information.
■
Crash (PR_1000006392) — The switch may crash with a message similar to:
Software exception at pmgr_util.c:1500 -- in 'mLACPCtrl'
■
Crash (PR_1000006427) — The switch may crash with a message similar to:
Software exception at lacp_util.c:1723 - in 'mLACPCtrl'
■
Crash (PR_1000006833) — The switch may crash with a message similar to:
Slave crash at AlphaSlaveLearn.c:1576
■
Crash (PR_1000006967) — The switch may crash with a message similar to:
Exception at sw_malloc.c:141 Out of Memory - SSH
■
Crash (PR_1000006988) — The switch may crash with a message similar to:
Slave crash in ISR @ dmaRx.c:838
■
Crash (PR_1000007148) — The switch may crash with a message similar to:
Bus error: HW Addr=0x7c7343b2 IP=0x002c3e54 Task='mIpAdMCtrl'
■
Crash (PR_1000007221) — The switch may crash with a message similar to:
Slave crash in mPmSlvCtrl at nc:phy.c:594
■
Crash (PR_1000007227) — The switch may crash with a message similar to:
Software exception at alloc_free.c:485 -- in 'tDevPollTx', task ID =
0x17a3c58'
■
Crash (PR_1000011477) — The switch may crash with a message similar to:
Bus error: HW Addr=0x06836252 IP=0x00444f14 Task='mHttpCtrl' Task
ID=0x11257f8
124
Software Fixes
Release E.08.30
■
Crash (PR_1000011517) — The switch may crash with a message similar to:
Slave crash in ISR at dmaRx.c:838
■
Crash (PR_1000013156) — Addressed master crash problem in memory system.
■
IP Helper (PR_1000004029) — Number of IP Helper addresses increased to 256 on the
5300.
■
MAC Authentication (PR_1000019250) — The switch will crash if a MAC Authentication
configured port is then configured for Trunking.
■
Meshing (PR_1000012101) — A meshed switch may cause a broadcast loop on the
network after a new module is inserted.
■
MDI/MDI-X (PR_1000001452) - MDI/MDIX mode not described in help.
■
Port Monitoring (PR_1000012218) — When port monitoring is configured, meshing
protocol packets may be sent out the wrong meshed ports.
■
Port Security (PR_10000001437) — Eavesdrop prevention.
■
RMON (PR_1000011690) — When RMON thresholds in the switch are exceeded, no trap
is generated.
■
STP (PR_1000005371) — Unable to set spanning tree "hello-time" via CLI in STP mode.
■
VLAN (PR_1000006670) — If a port resides only in a protocol VLAN, the menu will not
allow the user so save changes from the VLAN configuration window within the menu.
■
Web UI (PR_1000000256) — The Web UI may display a module as a "humpback module"
■
Web UI (PR_1000007144) — The VLAN Configuration help link is not available within the
Web UI.
Release E.08.30
Problems Resolved in Release E.08.30
■
Auto-TFTP (PR_20802) — Configuring the auto-tftp command with an incorrect IP address
for the TFTP server can cause the switch to reboot every 5-15 minutes.
■
CLI (PR_1000000769) — update and upgrade-software should not be normal CLI
commands.
■
CLI (PR_1000001384) — Misspelling in CLI Help screen for the static-mac command.
■
CLI (PR_1000001897) — Help screen for logging command does not mention ‘Major’ logs.
125
Software Fixes
Release E.08.30
■
CLI (PR_1000001628) — The CLI may incorrectly reject the adding of ports to a VLAN,
and respond with an Inconsistent Value error message.
■
CLI (PR_1000005912) — The slot/module identifications within the CLI are incorrect and
show slots numerically, rather than alphabetically.
■
CLI (PR_1000097427) — Extraneous columns in the show authentication command.
■
Config (PR_1000020659) — ProCurve 24 port 10/100 POE module identified with part
number J8151A rather than with the appropriate part number, J8161A.
■
CDP (PR_1000004099) — CDP advertises the switch as being only a router when routing
is enabled. Changes made so that the switch now advertises itself as both a router and a
switch when routing is enabled.
■
Crash (PR_1000007319) — The switch may crash with a message similar to:
Software exception in ISR at dmaRx.c:830 -> No resources available
■
Crash (PR_1000019386) — The switch may crash with a message similar to:
NMI occured: IP=0x00466f68 MSR:0x0000b032 LR:0x00000000
Task=’eDMAEmg001’ Task ID=0x1625f58 cr: 0x22000000 sp:0x01625eb0
xer:0x00000000
■
Enhancement (PR_1000020429) — Added the show chassis-version CLI command.
■
Help (PR_1000000560) — Within the CLI, the Port Security Help file does not reference
the learn mode "Limited-Continuous".
■
Help (PR_1000013464) — The show mac-address Help text is too long and exceeds the 80
character limitation.
■
Monitoring Port (PR_1000012218) — Port monitoring a mesh port can cause mesh
packets to be transmitted out the wrong port.
■
PIM (PR_1000004117) — “Expiry Time” changed to “Expire Time” following the show ip
PIM neighbor lists command within the CLI.
■
PIM (PR_1000004818) — PIM may not go into a forwarding state when a new neighbor
that doesn’t support state refresh connects.
■
PIM (PR_1000005019) — PIM will forward state refresh that is not from the assert winner.
■
PoE (PR_1000019004) — Extraneous Power Denied messages have been eliminated
when EPS power has been lost.
■
Port Security (PR_1000013075) — A port with Port Security enabled may learn addresses
beyond its configured limit, and require a reboot to clear.
126
Software Fixes
Release E.08.42
■
SSH (PR_1000003227) — Need a special case for the SSH protocol-version configuration
parameter to provide compatibility when back-revving to pre-E.08.xx code.
■
SSH (PR_1000004993) — Memory corruption in SSH function.
■
SSL (PR_1000012823) — SSL code modifications.
■
VLANs (PR_1000006670) — Protocol VLANs configured in the CLI may not show up in
the VLAN menu config screen and report that the member ports are orphaned.
Release E.08.42
Problems Resolved in Release E.08.42
■
ACL (PR_1000023119) — An invalid VLAN ACL will remain in the configuration.
■
CLI (PR_1000002138) — Incorrect message displayed in the CLI aaa port-access
command.
■
CLI (PR_1000022443) — Within the CLI Menu context, user unable to set a port as an
untagged member of a VLAN.
■
CLI (PR_1000085477) — The word "Specify" in ‘ip route’ is misspelled.
■
CLI (PR_1000085495) — The word "unavailability" is spelled wrong for the “radius server
dead-time” description within the CLI.
■
Crash (PR_1000021489) — The switch may crash with a message similar to:
Software exception at i2cdriver.c:75 in 'swInitTask'
■
Crash (PR_1000021567) — The switch may crash with a message similar to:
Software exception @ ipaddrmgrSCtrl.c:565
■
Crash (PR_1000022106) — The switch may crash with a message similar to:
Exception hit in alphaSLaveLearn.c:1534
■
Crash (PR_1000022814) — The switch may crash with a message similar to:
Software exception at alpha_chassis_slot_sm.c:563 -- in 'eChassMgr',
task ID = 0
■
Crash (PR_1000086916) — The switch may crash with a message similar to:
Software exception at if_ether.c:693 -- in 'tNetTask', task ID =
0x196d9b0 -> ASSERT: failed
■
Crash (PR_1000087055) — The switch may crash with a message similar to:
Software exception at ssh_utils.c:973 -- 'mftTask'
■
Hang (PR_1000006985) — The switch management may hang due to a memory corruption.
127
Software Fixes
Release E.08.53
■
Security (PR_1000021329) — Within the Web UI, the "Address Limit" value was always
displayed as 4 for a learn mode of Limited.
■
Security (PR_1000021732) — A configured IP Authorized Manager will fail following a
reboot.
■
Security (PR_1000085928) — The show port-access authenticator 1 CLI command shows
all port-access configured, but should show information for specified ports only.
■
SFlow (PR_1000021518) — SFlow returns sysUpTime in 100ths of seconds, rather than
1000ths.
■
SFlow (PR_1000021776) — The SFlow sysUpTime is not in sync with the switch sysUpTime.
■
SSH (PR_1000087086) — The switch does not report an error message after rejecting a
public key file with more than 10 keys.
■
Web UI (PR_89899) — The Web UI port statistic counters are overwriting one another.
■
Web UI (PR_1000021867) — VLAN context within Web UI may not allow untagged ports
to be added to a VLAN.
■
Web UI (PR_1000085927) — The Help text is not available from the authorized manager
screen.
Release E.08.53
Problems Resolved in Release E.08.53
■
IP Helper/DHCP Relay (PR 1*197046) — May not handle "DHCP Inform" relay properly.
■
NAT (PR_1*199309) — Routing to some end nodes fails when a cable is moved from one
port to another or when the equivalent action happens due to XRRP fail-over or fail-back.
■
NAT (PR_1*203787) — NAT problem when the switch has multiple VLANs configured on
a port with routing enabled (that is, the one-armed router scenario)
■
SNMP/Authorized Manager (PR_1*86062) — SNMP Sets allowed when in Operator
mode and IP Authorized-Manager is set.
Release E.09.02 (Beta Only)
Problems Resolved in Release E.09.02
■
DMA Driver (PR_1000209595) — ASSERT_RESOURCE prints No resources available if it fails.
■
IP Addmgr (PR_1000202539) — ARP cache gets cleared whenever a port comes up.
128
Software Fixes
Release E.09.03
■
IP Addmgr (PR_1000206356) — Software exception at ipamMAcl.c:712 -- host table
filled with no ACLs.
■
MGR (PR_1000202237) — VLAN MAC table flushing does not work.
■
Mirror Port (PR_1000204834) — Mirror-Port adds a VLAN tag to untagged, monitored
traffic.
■
NAT (PR_1000199309) — NAT getting lost when cable moved.
■
Other (PR_1000204617) — Port mirroring and ACLS cause blade assert at dmaRx.c:1319.
■
Other (PR_1000208358) — Mac-to-Host route table mismatch.
■
Other (PR_1000092011) — Software exception at c:356 -- in 'mHttpCtrl'.
■
Password (PR_1000201614) — Non-Null terminated password causes bus error crash in
setup menu.
■
Rate Limiting (PR_1000201978) — Radius rate-limiting-ingress should allow greater than
100%.
■
RMON (PR_1000011690) — When RMON thresholds in the switch are exceeded, no trap
is generated.
■
Self-Test (PR_1000200371) — Ports are not isolated during the self-test internal loopback
testing.
■
SNMP (PR_1000196170) — Traps are not buffered before the IP stack is initialized, causing
the possibility of missing some traps generated during startup.
■
SNTP (PR_1000199632) — NTP (SNTP) version 4 broadcast ignored by switch.
■
Tst.System (PR_1000204782) — Bus error when copying a configuration to the switch.
Release E.09.03
Problems Resolved in Release E.09.03
■
SNMP Trap (PR_1000212170) — Switch transmits Warm and Cold Start traps with an
agent address of 0.0.0.0.
■
Telnet Hang (PR_1000215388) — When a user executes the show configuration <filename>
command in a Telnet session and the file is longer than a single screen, the user’s Telnet
session may hang.
129
Software Fixes
Release E.09.04 (Beta Only)
Release E.09.04 (Beta Only)
Problems Resolved in Release E.09.04
■
PIM (PR_1000206791) — With PIM enabled, an IGMP "leave" received from one subscriber
causes all IP multicast streams to pause and then resume.
Release E.09.05 (Beta Only)
Problems Resolved in Release E.09.05
■
CLI/STP (PR_1000214598) — Switch does not accept the "spanning-tree 1 mode fast" CLI
command. Switch does accept and implement the span tree port mode fast setting via the
menu options. However, the setting does not show up in the running configuration.
■
LLDP (PR_1000213942) — Neighbor entry is deleted and re-learned when port adminstatus is changed from rxonly to tx_rx.
Release E.09.06 (Beta Only)
Problems Resolved in Release E.09.06
■
Config/Stack (PR_1000216051) — Copying a previously saved startup-configuration that
has "stack join (mac address)" to a member switch of the IP stack breaks the membership
of that same stack. Stack commander reports member "mismatched".
■
Web (PR_80857) — Java files are JDK 1.1, which are not Win2k compliant. (For this fix
they were recompiled using JDK 1.2.)
■
Web UI/Port Status (PR_93721) — The Port Status screen does not display all ports in
the Web user interface, and the scroll bar does not work.
Release E.09.07 (Beta Only)
Problems Resolved in Release E.09.07
■
QoS (PR_1000216179) — QoS DSCP is not maintained when the switch routes the packet.
Release E.09.08 (Beta Only)
Problems Resolved in Release E.09.08
■
Crash (PR_1000207542) — The switch may crash with a bus error or a task hang.
130
Software Fixes
Release E.09.09 (Beta Only)
■
Port Security (PR_1000203984) — Switch allows a user to enter more MAC addresses
than the configured limit.
Release E.09.09 (Beta Only)
Problems Resolved in Release E.09.09
■
XRRP (PR_1000217651) — XRRP may cause excessive event log messages.
Release E.09.10 (Not a General Release)
Problems Resolved in Release E.09.10
■
OSPF/Routing (PR_1000202847) — Asymmetrical routing with equal-cost paths results
in high CPU utilization and dropped packets. NOTE: This bug fix is NOT included in E.09.21,
but it is in releases E.09.22 and later.
Release E.09.21 (Beta Only)
Problems Resolved in Release E.09.21
■
CLI/GVRP (PR_1000216305) — The GVRP command no VLAN <vid> forbid <ports> incorrectly deletes ports configured for AUTO mode.
■
Crash (PR_1000216170) —The switch will crash with an 'mftTask' Bus Error after
uploading a startup-configuration from a TFTP server. The switch accepts the command with
no errors. However, the system will immediately crash after the reboot.
■
Crash (PR_1000021764) —The switch may crash with a message similar to:
Software exception in dmaRx.c:839.
■
Crash/LLDP (PR_1000217480) —The switch may crash with a Bus error specifying "Task
= mlldpCtrl".
■
Crash/SSH (PR_1000192010) —The switch may crash with a message similar to:
Software exception at exception.c:328 -- in 'tSsh0', task ID = 0x101c590.
■
Crash/Static Route (PR_1000217354) —The switch may crash with a Bus error in
mSnmpCtrl when adding a less-specific static route.
■
LLDP (PR_1000202129) — The command show lldp info remote does not provide correct
information.
131
Software Fixes
Release E.09.22
■
LLDP/Mesh (PR_1000216041) — Switch does not issue an Event Log message if LLDP is
configured inconsistently among mesh neighbors.
■
MAC Authorization (PR_1000212868) — MAC Authorization ages out a client prematurely when the client passes traffic in multiple VLANs.
■
Port Security (PR_1000210932) — Open VLAN mode (Unauthorized VLAN) does not
work correctly with any port-security learn-mode.
■
SSH (PR_1000207275) — The Codenomicon test tool causes memory leaks in SSH.
■
Virus Throttling (PR_1000213532) — The command show conn throttled-hosts displays
hosts on ports set to notify-only.
■
Web UI (PR_1000191635) — Port column may not be sorted correctly in all Web user
interface screens.
Release E.09.22
Problems Resolved in Release E.09.22
■
CLI (PR_1000223516) — CLI hangs when entering certain port commands such as those
involving Web MAC authentication or 802.1X.
■
MDI/MDI-X (PR_1000220687) — Switch does not report the state of MDI/MDI-X correctly
for ports on the J8161A PoE module.
■
RSTP (PR_99049) — Switch does not detect and block network topology loops on a single
port. For example, the port connects to a hub that has a loop or the port connects to an
inactive node via IBM 'Type 1' cable.
Release E.09.23 (Beta Only)
Problems Resolved in Release E.09.23
■
802.1s (PR_1000207608) — After the Spanning Tree Root Bridge is negotiated the nonroot ProCurve Switch continues to send out BPDUs claiming to be the Spanning Tree Root,
resulting in possible instability in the STP topology. Support: This is the 'Force10/yahoo' fix,
merged from the 2800.
■
Config (PR_1000215024) — Memory leak when loading a configuration file from a TFTP
server.
■
MST (PR_1000222230) — MSTP (802.1s) sometimes fails to block a loopback connection.
■
Web UI (PR_1000214188) — Problems with scroll bar after resizing window.
132
Software Fixes
Release E.09.24 (Beta Only)
■
Web UI (PR_1000223183) — VLANs are not displayed in QoS configuration.
■
Web (PR_1000214188) — Problems with the scroll bar after resizing window.
■
Web (PR_1000223183) — VLANs are not displayed in QoS configuration screen.
Release E.09.24 (Beta Only)
Problems Resolved in Release E.09.24
■
XRRP (PR_1000217922) — XRRP router in infinite-failback mode can sometimes give up
IP address control.
Release E.09.25 (Beta Only)
Problems Resolved in Release E.09.25
■
Config (PR_1000233062) — Download of Configuration to alternate configuration not
working.
■
XRRP (PR_1000217922) — There is a small possibility that the XRRP Router will fail back
to the XRRP peer even if infinite failback is enabled when running 802.1d and XRRP routers
are redundantly connected to a large switch domain.
Release E.09.26 (Beta Only)
Problems Resolved in Release E.09.26
■
Config (PR_1000228888) — The console becomes unresponsive (“hangs” or “freezes”)
when attempting to issue a configuration command, and then 802.1X and Web/MAC Authentication functions in the Switch do not operate.
■
Config (PR_1000229407) — Edge ports on a switch with MSTP are lost when the
configuration is TFTPed in from a TFTP server.
■
Hang (PR_1000228888) — The Console becomes unresponsive (“hangs” or “freezes”)
when attempting to issue a configuration command, resulting in 802.1X and Web/MAC
Authentication functions in the Switch ceasing to operate.
■
MSTP (PR_1000229407) — The Switch loses the MSTP 'edge-port' configuration when
the user TFTPs the configuration file from a server.
133
Software Fixes
Release E.09.29 (Beta Only)
Release E.09.29 (Beta Only)
Problems Resolved in Release E.09.29
■
Crash (PR_1000229656) — When RADIUS server is unavailable, the following message
appears:
Software Exception at exception.c:373 -- in 'tHttpd', task ID =
0x257dda8 -> Memory system error at 0x 24ea750 - memPartFree
■
Crash (PR_1000235856) — show tech' causes:
Software exception at dmaRx.c:868 -> ASSERT
■
Other (PR_1000221018) — Menu leaves proxy-ARP configured when IP routing is
disabled.
■
Other (PR_94943) — The Setup screen allows an illegal configuration (Proxy-ARP). Using
the “Setup” utility, you can toggle the Proxy-ARP entry (at the bottom of the screen) even
though IP routing is NOT enabled on the system.
■
Proxy ARP (PR_94943) — Setup screen allows illegal configuration (proxy-arp).
■
Proxy ARP (PR1000221018) — Menu leaves proxy-arp configured when routing is
disabled.
■
XRRP (PR_1000217922) — XRRP router in infinite-failback mode can sometimes give up
control of its IP address.
Release E.10.02
Problems Resolved in Release E.10.02
■
CLI (PR_1000223516) — CLI hang when performing command involving 802.1X, Web/
MAC authentication or port.
■
Config (PR_1000207697) — Loading a startup-config file fails when file declares a new
VLAN as a management VLAN.
■
Config (PR_1000215370) — Configuration file upper/lower case is not consistent. When
looking and viewing file there is inconsistencies between what is shown and what can be tab
completed
■
Crash (PR_1000229613) — A secondary flash update via PCM+ causes a bus error crash.
■
Crash (PR_1000243402) — Null semaphore usage in SSH. (The switch may crash when
“exit” is issued from slot context.)
134
Software Fixes
Release E.10.02
■
Crash (PR_1000233993) — A switch crash occurs after an snmpgetnext on the CDP MIB.
Software exception at exception.c:373 -- memory system error.
■
Crash (PR_1000232283) — Multiple TFTP requests from PCM cause a switch crash
“Software exception at fileTransferTFTP.c:182 -- in 'mftTask', task
ID = 0x107ee0.
■
Crash-OSPF (PR_1000234773) — Within a VLAN configured with an OSPF key-chain 255,
any time an external device is plugged into the VLAN on the 5300xl switch configured with
the key-chain, the 5300xl switch crashes with an ifInfo task: SubSystem 0 indicator.
■
J8162A (PR_1000219468) — No Event Log message when user reboots J8162A Access
Control Module without first shutting it down.
■
LLDP (PR_1000220937) — LLDP advertises the base MAC address when no VLAN-IP
exists. LLDP advertises “127.0.0.1” as the management TLV information on a port when no
IP address is configured on any VLAN that this port belongs to. It should advertise the switch’s
base MAC address instead.
■
LLDP (PR_1000241315) — show lldp issues:
•
Port descriptor may be corrupted, as displayed, if > 4.
•
PortID type of MAC-address is truncated.
•
ChassisId of type network-address is shown in MAC address format.
•
Remote Management Address type ethernet is shown in IP format.
•
Inconsistent name for PortDescr in detail view and summary (“PortDesc” vs “PortName”).
■
MST (PR_1000227432) — Learning flag is not set when CIST port states are transitioning.
■
Other (PR_1000214324) — J8162A Access Controller module VLAN base configuration
record. Should not create an “access-controller vlan-base” command in the remote configuration file if there is no J8162A blade in the system AND no J8162A has been configured for
the switch. (There are no client VLANs on the switch.)
■
Other (PR_1000085508) — A mini-GBIC is not recognized if the J4878A is hot-swapped
during boot-up.
■
Other (PR_1000221089) — The 64-bit counters are not correct.
■
Other (PR_1000227607) — Problem with show fault-finder. The table contains two extra
empty IDs.
■
Other (PR_1000235094) — With HTTP/RADIUS, a username/password box appears for
every switch between the manager and operator pages. If the Web user interface for the
switch management is configured login/enable with either RADIUS/local or local/RADIUS,
and local username/passwords are set and are not the same as for RADIUS, then a username/
135
Software Fixes
Release E.10.03
password box/prompt appears for every instance where there is a switch between an
operator-level Web page (such as Status) and a manager-level Web page (such as Configuration), and the reverse.
■
PIM-DM (PR_1000235581) — PIM DM does not always prune when Switch receives a PIM
Prune message.
■
Port Security (PR_1000244293) — Web/MAC Authentication clients do not de-authenticate immediately.
■
RMON (PR_1000240752) — The RMON and FFI severities need correct mapping. The FFI
severity levels are from low to high, whereas the RMON severity levels are mapped from high
to low.
■
SFTP (PR_1000227950) — SFTP image “puts” to a switch low on memory does not
succeed. The Event log shows
update: Disabled RMON to retrieve memory for download
on a 5300xl switch that has ~6.7M of free memory available. The transfer does not take place and
the Event log message is displayed for every attempt.
■
STP (PR_1000234771) — The switch does not do spanning-tree fast-aging when Webauthentication changes aging for LPORT.
■
Update (PR_1000227992) — SFTP allows an image upload of firmware for a different
platform (switch model).
■
Virus Throttling (PR_1000237928) — Add port names to the rest of the virus throttling
RMON messages. Three of the existing virus throttling messages do not have the LPORT
information.
■
XRRP/802.1s (PR_1000240958) — XRRP fail-over communication issues when MSTP is
also configured.
Release E.10.03
Problems Resolved in Release E.10.03
■
MAC Auth/Web Auth (PR_1000244293) - Web and MAC authentication clients do not deauthenticate immediately.
■
Config (PR_1000246102) - The show config command indicates a configuration file named
"config" already exists.
136
Software Fixes
Release E.10.04
Release E.10.04
Problems Resolved in Release E.10.04
■
Console/TELNET (PR_1000278912) - The 5300xl console will lock up when connected
via the console port and attempting to establish a TELNET connection into a remote switch.
■
Meshing (PR_1000218463) - If a mesh link goes down and a redundant (xSTP) link
external to the mesh goes into a forwarding state, connectivity across the mesh may be lost
for a previously learned MAC address.
■
SNMP (PR_1000003378) - SNMP switch time may drift with event log updates occurring
every 1.5 hours.
Release E.10.05
Problems Resolved in Release E.10.05
■
ACL (PR_1000283338) - The commands "show port-access mac" and "show port-access
web" incorrectly display the number of clients authenticated.
■
Crash (PR_1000282444) - When enabling OSPF MD5, the switch may crash with a message
similar to:
Software exception at exception.c:373 -- in 'mSess1’.
■
mini-GBIC (PR_1000283081) — After hot-swapping a mini-GBIC, the Link and Activity
LEDs do not turn on.
■
mini-GBIC (PR_1000283082) — Some Gigabit LX mini-GBICs may fail when the miniGBIC switch module is hot-swapped.
■
mini-GBIC (PR_1000283084) — When a mini-GBIC is removed from the module, the Fault
and Port LEDs will continue to flash.
■
RADIUS (PR_1000285456) — If more than one RADIUS assigned vendor specific attribute
(including Port-cos, rate-limiting-ingress, or ACLs) is configured with a non-vendor specific
attribute, only the first vendor specific attribute may be recognized by switch.
■
Web UI/mini-GBIC (PR_1000279145) — When using the web user interface, the switch
will not display an indication of the Gigabit 1000Base-T mini-GBIC (J8177B) from the
Configuration tab "Device View".
■
XRRP (PR_1000280213) — When configuring a XRRP instance, the following error
message is logged, although the particular subnet is configured properly
No subnet configured for the IP address.
137
Software Fixes
Release E.10.06
Release E.10.06
Problems Resolved in Release E.10.06
■
RSTP (PR_1000286883) — Slow RSTP fail-over and fall-back time.
Release E.10.07
Problems Resolved in Release E.10.07
■
802.1X (PR_1000290453) — 802.1X stops and restarts the accounting session during reauthentication.
■
802.1X (PR_1000216987) — An 802.1X client may age out prematurely if it communicates
in multiple VLANs.
■
802.1X (PR_1000235378) — When client based authentication was introduced in E.09.02,
the port based authentication mode, which allows an unlimited number of clients per port,
was inadvertently removed
■
Crash (PR_1000290428) — When a non-genuine mini-GBIC is installed into the switch,
the switch may crash with a message similar to:
"chassis: Slot A Software exception at port_sm.c:316 -- in
'mPmSlvCtrl', task ID = 0x4059c9d4."
■
Web-Authentication (PR_1000230444) — Some clients may not receive a Web-Authentication screen when using port-based Web-Authentication. This may occur if a client
receives the same unauthorized DHCP address that a previous authorized client had used.
Release E.10.08
Problems Resolved in Release E.10.08
■
Enhancement (PR_1000290489) — Support for “Friendly Port Names” was added.
Release E.10.09
Problems Resolved in Release E.10.09
■
Config (PR_1000301498) — The user cannot manually configure an IP address using the
"setup" menu.
■
FEC/CDP (PR_1000285111) — FEC and CDP transmit removal.
138
Software Fixes
Release E.10.10
■
Routing (PR_1000297773) — Certain types of traffic cause the switch to route very slowly
and drop packets.
■
RSTP (PR_1000297195) — The switch repeatedly flushes its MAC address table, resulting
in intermittent flooding of all traffic.
Release E.10.10
Problems Resolved in Release E.10.10
FEC (PR_1000281715) — Switch has no FEC support but shows FEC information in help text.
Releases E.10.11 to E.10.19 were never built.
Release E.10.20
Problems Resolved in Release E.10.20
■
Key Management System (PR_1000287934) — Some Key Management System (KMS)
configuration commands have no effect.
Release E.10.21
Release E.10.21 was never released.
Release E.10.22
Problems Resolved in Release E.10.22 (Never released)
■
Event Log (PR_1000306769) — When an OS upgrade causes an FEC trunk to be
converted, the following messages are logged:
[datestamp] mgr: Config file converted due to OS upgrade
W [datestamp] mgr: Unsupported feature "FEC" for trunk configuration;
see release notes
■
Event Log/ARP (PR_1000293466) — Generic Link Up message not showing up and
unnecessary flushing of ARP cache.
■
LLDP (PR_1000301069) — When LLDP admin status of a port changes from TX to DIS/
RX, the switch does not always send out shutdown frames.
■
LLDP (PR_1000303500) — Missing LLDP-MED information when using command:
"show lldp info remote-devices".
139
Software Fixes
Release E.10.23
■
Meshing (PR_1000300756) — Time delay in switch when reporting a mesh link being
down.
■
Web Authentication (PR_1000302945) — When a client fails authentication and is
assigned to the Unauthorized VLAN, it cannot communicate with other clients on the
Unauthorized VLAN.
Release E.10.23
Problems Resolved in Release E.10.23
■
CLI/DHCP (PR_1000286898) — Under some conditions, the CLI may freeze or lock up
when the DHCP relay agent is configured.
■
Crash (PR_1000307280) — Inconsistent or incorrect STP data may cause the switch to
crash with a message similar to:
Software exception at stp_mib.c:248 -- in 'mSnmpCtrl', task ID =
0x12d14b8\n-> ASSERT: failed.
■
IGMP (PR_1000301557) — Data-driven IGMP does not prevent flooding when no IP
address exists on a VLAN.
■
SNMP (PR_1000295753) — Removing 'public' SNMP community generates an empty
Event Log message.
■
IP Forwarding (PR_1000305739) — When a user attempts to configure 'ip forward-protocol
notables-dgm', the switch incorrectly configures 'ip forward-protocol netbios-ns' instead.
■
RSTP (PR_1000306227) — RSTP TCNs cause high CPU utilization and slow software
based routing.
Release E.10.24
Problems Resolved in Release E.10.24 (Never released)
Config (PR_1000238543) — The "Named Source-Port Filter" command would accept names up to
30 characters long, but the CLI could only display 20 characters. Name length limit is now changed
to 20 characters.
Enhancement (PR_1000292455) — Rate display for ports on CLI. See description under “Release
E.10.24 Enhancements” on page 27.
IDM (PR_1000310201) — The Switch fails to de-authenticate an 802.1X client after a corrupted
configuration file is received from a RADIUS server.
140
Software Fixes
Release E.10.25
Mini-GBIC (PR_1000308653) — On ProCurve Switch xl 16-port 10/100/1000 Module (J4907A), a
dual-personality port will stop working after a mini-GBIC is hot-swapped out.
RSTP (PR_1000309683) — Temporary routing or switching problems may occur after RSTP is
disabled.
Release E.10.25
Problems Resolved in Release E.10.25 (Never released)
Connection Rate Filter (PR_1000310834) — Memory leak found during ProCurve stress testing.
A user may see a switch reboot or halt if using the CRF traps and runs the switch for a sufficiently
long time between reboots.
Release E.10.26
Problems Resolved in Release E.10.26 (Never released)
■
SNMP Traps (PR_1000285195) — Switch does not save the option to disable a
“Link up/down” SNMP trap after a switch reboot.
Release E.10.27
Problems Resolved in Release E.10.27
■
Crash (PR_1000282359) — When searching the log for an extremely long string, the switch
may crash with a bus error similar to:
PPC Bus Error exception vector 0x300: Stack Frame=0x0c8c1a70 HW
Addr=0x6a73616c IP=0x007d3bc0 Task='mSess1' Task ID=0xc8c2920 fp:
0x6b61736a sp:0x0c8c1b30 lr:0x007d3b28.
■
LLDP (PR_1000310666) — The command "show LLDP" does not display information
learned from CDPv2 packets.
■
MSTP Enhancement (PR_1000317990) — Implemented new CLI commands, "span
legacy-mode" and "span legacy-path-cost".
■
RSTP (PR_1000307278) — Replacing an 802.1D bridge device with an end node (non-STP
device) on the same Switch port, can result in the RSTP Switch sending TCNs.
■
Web UI (PR_1000305944) — The Port Configuration screen display is blank due to a Java
error when using Windows Explorer 6.0.
■
Web UI (PR_1000311917) — When the last port on the last card is configured in a trunk
or mesh, and a user browses to a specific location in the Web user interface, the HTTP web
server degrades the switch, causing the Web user interface to hang.
141
Software Fixes
Release E.10.30
Releases E.10.28 and E.10.29 were never built.
Release E.10.30
Problems Resolved in Release E.10.30 (Not a general released)
■
Enhancement — Added support for J9001A module.
Release E.10.31
Problems Resolved in Release E.10.31 (Not a general released)
■
Enhancement (PR_1000306695) - Added show tech command, "show tech transceivers"
to allow removable transceiver serial numbers to be read without removal of the transceivers
from the switch. This command also reports failed transceiver numbers and the reasons for
the failure.
■
Help Menu (PR_1000317711) - In the VLAN menu Help text, the word 'default' is misspelled.
■
SNMP (PR_1000310841) - User can assign illegal values for CosDSCPPolicy through
SNMP. All other user-interfaces for configuring QoS (CLI, Web UI, ProCurve Manager and
Radius) function correctly.
■
SNMP (PR_1000315054) - SNMP security violations appear in syslog after a valid SNMPv3
“get” operation.
■
System (PR_1000318026) - After a reboot, the Switch may provide a false error message
that a module is unsupported or may be faulty.
Release E.10.32
Problems Resolved in Release E.10.32 (Never released)
■
Crash (PR_1000322009) — The Switch may crash with a message similar to:
Software exception in ISR at queues.c:123.
■
Crash (PR_1000323675) — The Switch may crash with a message similar to:
ASSERT: Software exception at aaa8021x_proto.c:501 -- in 'm8021xCtrl'.
■
Crash (PR_1000327132) — The Switch may crash with a message similar to:
Software exception in ISR at btmDmaApi.c:304.
142
Software Fixes
Release E.10.33
■
DHCP Enhancement (PR_1000311957) — Added option to configure the switch to use
the management VLAN IP address in the Option 82 field for all DHCP requests received from
various VLANs. For details, see “DHCP Option 82: Using the Management VLAN IP Address
for the Remote ID” on page 29
■
Enhancement (PR_1000287679) — Fast Boot CLI & SNMP Implementation. For details
see “Using Fastboot To Reduce Boot Time” on page 29.
■
ICMP (PR_1000235905) — Switch does not send a 'destination unreachable' response
message when trying to access an invalid UDP port.
■
Menu (PR_1000318531) — When using the 'Menu' interface, the Switch hostname may be
displayed incorrectly.
Release E.10.33
Problems Resolved in Release E.10.33 (Never released)
■
Counters (PR_1000321097) — Drop counters are displaying incorrect information.
■
Counters (PR_1000321476) — SNMP counter may display incorrect information.
■
Enhancement (PR_1000330704) — Added RADIUS Command Authorization and
Accounting for the Command Line Interface.
Release E.10.34
Problems Resolved in Release E.10.34 (Not a general release)
■
SSHv2 (PR_1000320822) — The Switch does not generate SSHv2 keys and may crash with
a message similar to:
TLB Miss: Virtual Addr=0x00000000 IP=0x80593a30 Task='swInitTask' Task
ID=0x821ae330 fp:0x00000000 sp:0x821adfb8 ra:0x800803f0 sr:0x1000fc01.
■
Module Fault (PR_1000331147) — Switch modules J9001A (Switch xl Wireless EDGE
Services Module) and J8162A (Switch xl Access Controller Module) will fault if Fast Boot is
enabled and the log will report the following Major event:
"HPESP: Access Controller XL Module x: incompatible BIOS version".
143
Software Fixes
Release E.10.35
Release E.10.35
Problems Resolved in Release E.10.35 (Not a general release)
■
Event Log (PR_1000323203) — MD5 hash mismatch log messages are triggered with
VLAN toggles: "OSPF Drop pkt from:xxx.xxx.xxx.xxx md5-key-id:1 reason: md5 hash mismatch".
■
IDM (PR_1000334365) — Using EAP/802.1x with IDM ACLs can result in memory leaks.
■
OSPF (PR_1000323201) — OSPF does not always redistribute connected networks when
MD5 authentication is enabled and connected subnets or VLANs are toggled.
■
Web UI (PR_1000302713) — When using the web user interface and a large amount of
stacking interactions occur, portions of the information from the stack commander may no
longer appear.
Release E.10.36
Problems Resolved in Release E.10.36 (not a general release)
■
CLI (PR_1000322029) — The command "show vlans" does not display data correctly in
the status field.
■
Config/Security (PR_1000334412) — Operator level can save Manager privilege level
changes to the configuration.
■
Log (PR_1000323790) — The switch detects a non-genuine ProCurve mini-GBIC as a port
self test failure and subsequently disables the link.
■
sFlow Enhancement (PR_1000337714) — Added new "show sflow" commands to the
CLI. For details, see “SFlow Show Commands” on page 32.
■
Web UI (PR_1000331431) — The QoS Configuration Tab is not working correctly when
using the Web User Interface.
Release E.10.37
Problems Resolved in Release E.10.37
■
CLI (PR_1000330553) — Garbage characters displayed in "show snmp-server" CLI output.
■
Menu (PR_1000308364) — In the Menu's Switch Configuration->System Information
screen, the “SNTP Poll Interval” field is missing the poll interval descriptor.
■
STP/RSTP/MSTP (PR_1000330532) — Improved the "show" commands display of STP
ports detail information to assist in monitoring and troubleshooting the spanning tree
protocol. See “Spanning Tree Show Commands” on page 35 for details.
144
Software Fixes
Release E.10.38
Release E.10.38
Problems Resolved in Release E.10.38 (not a general release)
■
Enhancement (PR_1000338847) — Added support for the Advanced Encryption Standard (AES) privacy protocol for SNMPv3.
Release E.10.39
Problems Resolved in Release E.10.39 (not a general release)
■
Authentication (PR_1000343377) — When running the Windows XP 802.1X supplicant
and the switch sends a re-authentication, Windows XP prompts the user to re-enter their
username and password again.
■
Authentication (PR_1000344961) — A port with multiple 802.1X users on it will allow
traffic to pass for a user after that user's supplicant has been stopped.
■
CLI/PCM (PR_1000343949) — ProCurve Manager fails to map the wireless services
module correctly, thus preventing access to TELNET or the CLI for managing the device.
■
DHCP (PR_1000343149) — A client cannot obtain an IP address when two DHCP servers
are connected on different local networks.
Release E.10.40
Problems Resolved in Release E.10.40 (Never released)
■
CLI (PR_1000347788) — The wrong error message is displayed in response to a nonauthorized CLI command
■
Crash (PR_1000339551) — When using the Menu to disable IP routing, the Switch may
crash with a message similar to:
Bus Error in task 'msess1'. PPC Bus Error exception vector 0x300:
Stack-frame=0x0162e030 HW Addr=0x2e2e2e2d IP=0x00166b7c
Task='mSess2' Task ID=0x162e2c8
■
Crash (PR_1000348454) — The switch may reboot with an NMI event when a loop is
formed on the network. The crash task may vary by switch configuration.
■
Crash (PR_1000337443) — Loading a config file larger then 64k via TFTP server crashes
the switch with a message similar to:
Software exception in ISR at dmaRx.c:868 -> ASSERT: No resources
available!
145
Software Fixes
Release E.10.41
■
Enhancement (PR_1000323618) — If SCP or SFTP are enabled, TFTP is automatically
disabled. TFTP cannot be enabled if either SCP or SFTP are enabled.
Release E.10.41
Problems Resolved in Release E.10.41 (Never released)
■
Radius EAP (PR_1000334731) — PEAP/TLS EAP types fail to authenticate with Microsoft
IAS Radius Server. The switch event log will report, "can't reach RADIUS server."
Release E.10.42
Problems Resolved in Release E.10.42 (Not a general release)
■
CLI (PR_1000344362) — The CLI help text was updated in the areas of "ip igmp auto,
forward and blocked"
■
CLI (PR_1000342461) — When a trunk is configured on an uplink port, the command
"show lldp info remote <port number>" reports incorrect information for the remote management address.
■
Enhancement (PR_1000344652) — Added support for Unidirectional Fiber Break
Detection.
■
Enhancement (PR_1000354170) — 802.1X Controlled Directions enhancement. With this
change, users will be able to use “Wake-on-LAN” with computers that are connected to ports
configured for 802.1X authentication.
■
SNMP (PR_1000312285) — The old value of the SNMP LLDP-MED trap (lldpXMedRemDeviceClass) is supported.
Release E.10.43
Problems Resolved in Release E.10.43 (Not a general release)
■
Enhancement (PR_1000351445) — The "show tech transceiver" CLI command output
now contains the HP part number and revision information for all transceivers on the switch.
■
QoS (PR_1000304105) — The maximum QoS rules limit is incorrect, internal to the switch.
■
UDLD (PR_1000355632) — If the maximum number of source port filters (78) is allocated
and UDLD is turned on, then it is possible that the last allocated source port filter may not
work correctly, and/or UDLD may forward UDLD protocol packets to the wrong port.
146
Software Fixes
Release E.10.44
Release E.10.44
Problems Resolved in Release E.10.44
■
802.1X (PR_1000353479) — Changing the supplicant start period (e.g., "aaa port-access
supplicant A1 start-period 15") corrupts the supplicant password on a switch that is configured as a supplicant.
■
Enhancement (PR_1000360929) — DHCP Protection enhancement for switch 5300xl.
■
LLDP (PR_1000308878) — The CLI output for "show LLDP info remote <port>" is not
displaying the correct format for the Chassis ID and Management Address.
Release E.10.45
Problems Resolved in Release E.10.45 (Not a general release)
■
802.1x (PR_1000358534) — For the Controlled Directions feature of 802.1X to operate
correctly, spanning tree must be enabled and authenticator ports must be set as edge ports.
This fix removes a limitation that requires these steps be done in a specific order.
■
CLI (PR_1000359913) — When "aaa authorization commands radius" is configured, and a
user tries to execute a command for which that user is not authorized, the following
inaccurate error message is shown.
Disable dhcp option 82 management option before disabling management
vlan.
■
Source Port Filtering (PR_1000352851) — Source Port Filtering on trunks does not work
when both the source and destination are trunk ports, even though the switch accepts the
configuration.
■
Trunking (PR_1000364354) — When a switch with 30 or more trunks is rebooted, the
switch may crash with a message similar to:
NMI event SW:IP=0x00456520 MSR:0x0000b032 LR:0x004564d0
Task='mLpmgrCtrl' Task ID=0x150d940
Release E.10.46
Problems Resolved in Release E.10.46 (Not a general release)
■
147
CLI (PR_1000358129) — The command line interface (CLI) becomes unresponsive after
running RMON traps code.
Software Fixes
Release E.10.47
■
Enhancement (PR_1000346164) — RSTP/MSTP BPDU Protection enhancement. When
this feature is enabled on a port and that port receives a spanning tree BPDU, the switch will
disable (drop link) the port, log a message, and optionally, send an SNMP TRAP.
■
Enhancement (PR_1000365862) — Addition to the RSTP/MSTP BPDU Protection
enhancement. This portion of the enhancement added the option of configuring ports that
had been previously disabled by BPDU Protection to be automatically re-enabled.
Release E.10.47
Problems Resolved in Release E.10.47 (Not a general release)
■
Crash (PR_1000368540) — The switch may crash with a message similar to:
Software exception at parser.c:8012 -- in 'mSess2',
task ID = 0x90e10e0 -> ASSERT: failed.
■
Crash (PR_1000371265) — A mini-GBIC hot swap on the J4878B module may crash the
switch with a message similar to:
Software exception at buffers.c:2198 -- in 'mPpmgrCtrl'.
■
Hang (PR_1000368539) — When Connection Rate Filtering is enabled, the switch may
hang or become unresponsive under heavy virus load.
■
Hang (PR_1000346328) — RMON alarms/events configuration files may become corrupt
and prevent initialization, resulting in failure to boot.
■
RADIUS (PR_1000358525) — Attributes that were overridden by RADIUS (CoS, Rate, and
ACL) remain active if an authenticated user fails to send EAP-LOGOFF.
■
XRRP (PR_1000368594) — When XRRP infinite failback is enabled, the switch fails to
forward packets after a reboot of the Master.
Release E.10.48
Problems Resolved in Release E.10.48 (Never released)
BPDU Protection (PR_1000374748) — This fix prevents the BPDU Protection enhancement from
enabling a port if Loop Protection still has that port disabled.
Enhancement (PR_1000376406) — Loop Protection feature additions, including packet authentication, loop detected trap, and receiver port configuration.
Enhancement (PR_1000379804) — Historical information about MAC addresses that have been
moved has been added to the "show tech" command output.
148
Software Fixes
Release E.10.49
Release E.10.49
Problems Resolved in Release E.10.49 (Never released)
■
Enhancement (PR_1000336169) — Added support for STP Per Port BPDU Filtering and
related SNMP Traps.
Release E.10.50
Problems Resolved in Release E.10.50 (Never released)
■
CLI (PR_1000292887) — The CLI command "aaa port-access web-based <port-list> redirecturl" accepts only the first 103 characters of the maximum allowed value of 127 characters.
■
CLI (PR_1000364628) — The command output from "show ip rip peer" yields an improperly
formatted peer IP address.
■
Enhancement (PR_1000335860) — This enhancement provides a configuration option
for the source IP address field of SNMP response and SNMP trap PDUs.
■
Web/RADIUS (PR_1000368520) — Web Authentication doesn't authenticate clients due
to a failure to send RADIUS requests to the configured server.
Release E.10.51
Problems Resolved in Release E.10.51 (Not a general release)
■
Enhancement (PR_1000385565) — Port security static MAC address limit increased to 32.
■
SNMP (PR_1000388175) — SNMP PDU configuration CLI commands are not working on
5300xl platform.
Release E.10.52
Problems Resolved in Release E.10.52
■
Enhancement (PR_1000374085) — This enhancement expands the use of the Controlled
Directions parameter to also support mac/web authentication.
■
MSTP (PR_1000385573) — MSTP instability issue when root switch priority is changed.
This causes other switches with better priority to each assert themselves to be root thus
causing a root war to occur.
■
OSPF/ECMP (PR_1000377365) — The switch does not support ECMP of type 5 External
LSAs.
149
Software Fixes
Release E.10.53
Release E.10.53
Problems Resolved in Release E.10.53 (never released).
■
CLI/LLDP (PR_1000377191) - Output from the CLI command, "show lldp info remote-device
<port>" shows a blank field for the chassis ID.
■
CLI (PR_1000390042) - Corrupted Spanning Tree Status/Configuration Menu screens
■
CLI (PR_1000380660) - The "show tech transceivers" CLI command displays the wrong
message when inserting an "A" version transceiver into a switch that only supports "B"
version transceivers. Also, "B" version CX4 transceivers show up as "A" and "A" version SR,
LR, and ER transceivers show up as "B" versions.
■
CLI (PR_1000390970) - The command "tftp-enable" is removed from the CLI since that
functionality is served by "tftp server|client"
■
CLI/config (PR_1000391119) - Copying a configuration file to a switch with a BPDU
protection timeout value set may produce an error similar to:
CCCCCline: 10007. 1200: Error setting configuration
■
CLI/Show tech (PR_1000378957) - After a hotswap of chassis modules, the "show tech
statistics" value for the field "linked port on box" may be inaccurate.
■
CLI (PR_1000332725) - ICMP rate limiting messages refer to ports as a port number rather
than the slot/port numbers.
■
CLI (PR_1000390385) - The CLI help text for "span bpdu-protection-timeout" is incorrect; it
erroneously displays the help text for "span hello-time".
■
CLI/Config (PR_1000377413) - The CLI does not prevent an invalid configuration from
being loaded. With this fix, configurations with excess IP Address QoS entries will result in
an error message and the config file will not load.
■
Crash (PR_1000382962) - Executing the CLI command, "sho int" on a miniGBIC that isn't
linked, may cause the switch to crash with a message similar to:
Divide by Zero Error: IP=0x8017becc Task='mSess1' Task ID=0x834b19d0
fp:0x00000018 sp:0x834b0d20 ra:0x8017be18 sr:0x1000fc01 Division by
0 Crash at cli_opershow_action.c:1298.
■
Crash (PR_1000392863) — Switch may crash when "setmib tcpConnState" is used, with a
message similar to:
NMI event SW:IP=0x0079f4a0 MSR:0x00029210 LR:0x006dca60
Task='eTelnetd' Task ID=0x8a7cbb0 cr: 0x20000042 sp:0x08a7c871
150
Software Fixes
Release E.10.54
■
Enhancement (PR_1000376626) — Enhanced CLI "qos dscp-map he" help and "show dscpmap" text to warn user that inbound classification based on DSCP codepoints only occurs if
"qos type-of-service diff-services" is also configured.
■
Traceroute (PR_1000379199) - The reported "traceroute" time is inaccurate; it is one
decimal place off.
■
Trunking (PR_1000238829) - Trunks numbered trk10 and greater cause the output from
the CLI command "show span" output to be misaligned.
■
SNMP (PR_1000392847) — RMON alarms that monitor port-specific OIDs are lost if the
switch is rebooted.
Release E.10.54
Version E.10.54 software was never released.
Release E.10.55
Problems Resolved in Release E.10.55.
■
CLI (PR_1000395256) — The loop-protect PORT-LIST receiver-action <action> command
does not enable the ports as it should.
■
CLI (PR_1000240838) — If an invalid time is entered using clock set command, the switch
responds with an "invalid date" error.
■
CLI (PR_1000199785) — The tab help function (command-completion) for "IP RIP authentication” is inaccurate. The help selection lists "OCTET-STR Set authentication key" when it
should be "ASCII-STR Set RIP authentication key (maximum 16 characters)".
■
Daylight savings (PR_1000364740) — Due to the passage of the Energy Policy Act of
2005, Pub. L. no. 109-58, 119 Stat 594 (2005), starting in March 2007 daylight time in the United
States will begin on the second Sunday in March and end on the first Sunday in November.
■
RIP (PR_1000393366) — The switch does not process RIP (v2) responses containing
subnets with a classful subnet mask, when the receiving RIP switch has a connected VLSM
network defined that would fall within that classful range.
■
sFlow (PR_1000396889) — If the Sflow skip count is set greater than the maximum skip
count or less than minimum skip count, the switch returns an error, which prevents ProCurve
Manager from collecting traffic sampling data.
■
Syslog (PR_1000379802) — Forwarding of event log message to a configured syslog server
is not disabled when a specific event log message has been disabled via MIB.
151
Software Fixes
Release E.10.56
Release E.10.56
Problems Resolved in Release E.10.56 (Never released).
■
CLI (PR_1000373443) — The CLI update command help text and confirmation message is
misleading and confusing.
■
RSTP (PR_1000401394) — When a dynamic LACP trunk transitions to either link-up or
link-down, this action occasionally triggers RSTP instability within the switch. This can result
in loops and broadcast storms.
Release E.10.57
Problems Resolved in Release E.10.57 (Not a general release)
■
Crash (PR_1000407542) — Attempting to change the spanning-tree protocol version from
STP to RSTP or MSTP may cause the switch to crash with a message similar to:
PPC Bus Error exception vector 0x300: Stack-frame=0x063d5de0
HW Addr=0x4b5a697c IP=0x0064c648 Task='mSnmpCtrl'
Releases E.10.58 and E.10.59
Releases E.10.58 and E.10.59 were never built.
Release E.10.60
Problems Resolved in Release E.10.60 (Not a general release)
■
QoS (PR_1000357102) — QoS configuration allows invalid IP addresses.
Release E.10.61
Problems Resolved in Release E.10.61
■
BPDU Protection (PR_1000395569) — BPDU-protection fails after module hot-swap.
■
Crash (PR_1000410959) — If the snmpv3 user is deleted on the switch without deleting
the associated parameters, then the switch is rebooted, it will repeatedly crash with a
message similar to:
Software exception at exception.c:373 -- in 'mSnmpEvt',
task ID = 0x17d1818 -> Memory system error at
0x17c22e0 - memPartFree
152
Software Fixes
Release E.10.62
■
Hotswap (PR_1000412501) — Some modules fail to initialize following hotswap, but have
no trouble initializing with warm or cold boot.
Release E.10.62
Problems Resolved in Release E.10.62.
■
IP Connectivity (PR_1000418378) — The switch incorrectly updates its ARP table when
a client that is configured with a valid IP address for a valid VLAN is connected to a port in
another VLAN on the switch. This will result in the loss of connectivity for the valid client in
the appropriate VLAN.
■
Crash (PR_1000421322) — Following execution of config-related CLI commands (such
as "show run" or "show tech") or when PCM attempts to retrieve the configuration file via
TFTP from a switch having a large configuration file, the switch may crash with a message
similar to:
Software exception at exception.c:373 -- in 'tTftpDmn', task ID =
0x11cfaa8 -> Memory system error at 0x1175550 – memPartFree
The following related crash may also be addressed with this fix:
PPC Bus Error exception vector 0x300: Stack-frame=0x016778b0 HW
Addr=0x667c4c88 IP=0x004dbc88 Task='eChassMgr' Task ID=0x1677dd8 fp:
0x667c4c88 sp:0x01677970 lrecpgyp
■
RSTP (PR_1000405368) — When a primary link goes down and then comes back online,
traffic continues on the redundant link and does not shift back to the primary link.
Release E.10.63
Problems Resolved in Release E.10.63 (never released).
■
TFTP (PR_1000426821) — TFTP transfers do not work when there is not an IP address
configured for VLAN 1.
■
ROM Patcher (PR_1000422768) — The ROM was updated from version E.05.04 to version
E.05.05 to support product software greater than 4MB in size.
Release E.10.64
Problems Resolved in Release E.10.64 (never released).
■
153
Crash (PR_1000430860) — The switch may crash with a message similar to:
Software Fixes
Release E.10.65
Software exception at termio.c:575 -- in 'mSesInp3', task ID =
0x111f1d8\n-> ASSERT: failed\n", pRegs=0x850000) at exception.c:212
■
Enhancement (PR_1000340292) — Flash file system compaction improvements were
completed.
■
Crash (PR_1000432587) — When the J8162A and/or J9100A modules are present, the
switch may crash with a message similar to:
NMI event SW:IP=0x00508d40 MSR:0x0000b032 LR:0x00508d40 Task='eChassMgr' Task ID=0x1771eb8 cr: 0x42000042 sp:0x01771c38 xer:0x00000000
■
Enhancement (PR_1000433763) — The Dynamic ARP Protection feature was added.
Release E.10.65
Problems Resolved in Release E.10.65 (never released).
■
RMON (PR_1000424204) — The ProCurve Manager RMON manager is failing to create
alarms.
Release E.10.66
Problems Resolved in Release E.10.66.
■
Web UI (PR_1000414459) — During configuration of the GVRP Mode via the Web interface
(Configuration -> VLAN Configuration -> GVRP Mode), the port list does not show the last
three port entries.
Release E.10.67
Problems Resolved in Release E.10.67.
■
ARP Protection (PR_1000438129) — ARP and ARP protection data may not display
correctly following a CLI or SNMP status query.
■
802.1X (PR_1000446227) — Switch 802.1X authentication running over PAP does not
work if RADIUS message authenticator attribute is required. This fix adds the message
authenticator attribute to non-EAP RADIUS responses.
154
Software Fixes
Release E.10.68
Release E.10.68
Problems Resolved in Release E.10.68.
■
SCP (PR_1000428142) — The switch does not exit a secure copy protocol (SCP) session
properly.
■
Loop Protection (PR_1000447746) — Client-based AAA stops any packets with unauthenticated source mac-addresses, including loop-protect packets. This makes loops difficult
to detect.
Release E.10.69
Problems Resolved in Release E.10.69.
■
Crash (PR_ 1000456340) — The switch may crash with a message similar to:
No message buffers: alloc_free.c:435.
The trigger for this crash is unknown, though it is suspected to be
related to sFlow.
■
SNMP (PR_1000406398) — URL-embedded SNMP traps are not sent as SSL (HTTPS)
when SSL is enabled, but they are instead sent as plain-text (HTTP). This may result in the
trap receiver (PCM) being unable to display the URL when SSL is enabled.
■
Web/Security (PR_1000416167) — CA-signed certificates cannot be installed via the Web
interface when they exceed 1800 bytes; an error occurs, indicating that the certificate is too
large.
■
Crash (PR_1000369659) — Under heavy multicast stress, the switch may crash with a
message similar to the following. It is possible there are other triggers or crash messages.
Software exception at alphaMcasts.c:536.
Release E.10.70
Problems Resolved in Release E.10.70 (Never released).
■
PIM (PR_1000714322) — PIM-DM receives activity reports from IPAM periodically which
tells PIM which flows have seen activity since the last report. When PIM-DM receives an
activity report for a flow for which it has no record, it ignores that rather than signaling IPAM
to remove the flow.
■
Telnet Hang (PR_1000457765) — If Ctrl+S is typed and then Telnet window is closed, the
Telnet sessions may become unresponsive, fail to be reset by the kill command issued at the
console prompt, and may ultimately require the switch to be reloaded to become active again.
155
Software Fixes
Release E.10.71
Release E.10.71
Problems Resolved in Release E.10.71.
■
SSH/SCP (PR_1000453751) — The switch does not exit a secure copy protocol (SCP)
session properly, particularly when a software image is transferred.
Release E.10.72
Problems Resolved in Release E.10.72 (Never released).
■
SFTP/SCP (PR_1000428974) — SFTP or SCP transfer of the configuration files fail to
complete.
■
CLI (PR_1000280635) — The CLI command no interface <port-list> rate-limit all does not
remove the config record.
■
Trunk (PR_1000461440) — When dynamic ARP protection and DHCP snooping are
configured, a trunk’s trust status cannot be configured from the appropriate interface
configuration context.
■
Crash (PR_1000739284) — Running the show tech CLI command may cause the switch
to crash with a message similar to:
Software exception in ISR at dmaRx.c:868.-> ASSERT:
available!
■
No resources
Crash (PR_1000395270) — When the IGMP group table fills to capacity, the switch may
crash with a message similar to one of the following:
NMI event SW:IP=0x002384c8 MSR:0x0000b032 LR:0x002384dc
Task='mIgmpCtrl' Task ID=0x1456b48 cr: 0x22000084 sp:0x01456a48
xer:0x20000000
NMI event SW:IP=0x002384c4 MSR:0x0000b032 LR:0x002384dc
Task='eDrvPoll' Task ID= 0x17a6ac8 cr: 0x44000080 sp:0x017a6950
xer:0x00000000.
Release E.10.73
Release E.10.73 was never released (Never released).
156
Software Fixes
Release E.10.74
Release E.10.74
Problems Resolved in Release E.10.74.
■
Mirroring (PR_1000460844) — When multiple VLANs are configured on the same port,
and VLAN monitoring is enabled, packets to other VLANs are mirrored.
■
CLI (PR_1000455370) — Commands that display port maps may have corrupted output.
For example, a single port may be displayed as a port range.
■
Daylight Savings (PR_1000467724) — DST is outdated for the Western-European Time
Zone. This change corrects the schedule for Western Europe Time Zone: DST to start the last
Sunday in March and DST to end the last Sunday in October.
■
Config (PR_1000464345) — The characters "IP(" when present as part of a port name may
cause corruption of the configuration when the switch is restarted.
Release E.11.02
Problems Resolved in Release E.11.02.
■
TFTP/SFTP (PR_1000739557) — A TFTP or SFTP transfer from the switch to an external
destination does not succeed when the file transferred exceeds 4MB.
■
LLDP (PR_1000463932) — Output from the command show lldp info remote-device does
not accurately report the local module and port information for the remote devices.
■
Enhancement (PR_1000372989) — This enhancement enables the setting of operator/
manager username/password via SNMP. For more information, see “Release E.11.02
Enhancements” on page 77.
■
Enhancement — Support has been added for the ProCurve Switch 5300xl Series single port
10-GbE module, (J8988A), available March 1, 2008. For more information, see “Release
E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000415155) — The ARP age timer was enhanced from the previous
limit of 240 minutes to allow for configuration of values up to 1440 minutes (24 hours) or
"infinite" (99,999,999 seconds or 3.2 years). For more information, see “Release E.11.02
Enhancements” on page 77.
■
Enhancement (PR_1000408960) — RADIUS-assigned GVRP VLANs are now supported.
For more information, see “Release E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000413764) — Increase the size of the sysLocation and sysContact
entries from 48 to 255 characters. For more information, see “Release E.11.02 Enhancements” on page 77.
157
Software Fixes
Release E.11.03
■
Enhancement (PR_1000419653) — The show VLAN ports command was enhanced to
display each port in the VLAN separately, display the friendly port name (if configured), and
display the VLAN mode (tagged/untagged) for each port. For more information, see “Release
E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000412747) — TACACS+ single sign-on for administrators is now
supported. For more information, see “Release E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000428642) — The SNMP v2c describes two different notification
type PDUs: traps and informs. Prior to this software release, only the trap’s sub-type was
supported. This enhancement adds support for informs. For more information, see “Release
E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000428213) — This software enhancement adds the ability to
configure a secondary authentication method to be used when the RADIUS server is
unavailable for the primary port access method. For more information, see “Release E.11.02
Enhancements” on page 77.
■
Enhancement (PR_1000443349) — This enhancement is to allow the concurrent use of
SFTP with TACACS+ authentication for SSH connections. For more information, see
“Release E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000457691) — This enhancement allows the mapping of all theoretically available VLAN IDs (1-4094) to an MSTP instance, even if some of the VLANs are not
currently configured on the switch. For more information, see “Release E.11.02 Enhancements” on page 77.
■
Enhancement (PR_1000401306) — The Reload "IN/AT" feature allows reload at a specified time or after a specified time interval. For more information, see “Release E.11.02
Enhancements” on page 77.
Release E.11.03
Problems Resolved in Release E.11.03.
■
SNMP (PR_1000763386) — SNMPv3 users are not reflected in the startup configuration.
■
Crash (PR_1000464345) — The characters "IP(" when present as part of a port name may
cause config corruption when the switch is restarted.
■
Management Hang (PR_1000763011) — In a 5308xl with modules only in slots A and H,
specific SNMP get requests may trigger the switch management to perform very slowly or
become unresponsive for a period that may vary from hours to days. The symptoms are
typically accompanied by a chronic increase in the missed packet buffer counter.
158
Software Fixes
Release E.11.04
Release E.11.04
Problems Resolved in Release E.11.04 (Not a public release).
■
Web GUI (PR_1000760153) — A Java Error occurs when viewing the "Stack Closeup" page
in the Web Management Interface, causing a blank page to be displayed.
■
Authentication (PR_1000454714) — Concurrent 802.1X and MAC Authentication does
not give the 802.1X value precedence. This fix gives 802.1X VLAN assignment precedence
over MAC Auth RADIUS VLAN assignment.
■
CLI (PR_1000430534) — Output from the show port-access mac-based CLI command may
omit connected clients.
■
DHCP Snooping (PR_1000469934) — When DHCP Snooping is enabled and configured,
and a client sends a “DHCPINFORM” after receiving address information, the DHCP server
response is not forwarded to the client by the switch.
■
RADIUS/Jumbo (PR_ 1000779048) — When an 802.1X enabled port belongs to a VLAN
that is jumbo enabled, the Access-Request will specify a value of Framed-MTU of 9182 bytes.
When the RADIUS server replies with a large frame, the switch does not respond, causing
the authentication process to halt.
■
Crash (PR_0000001756) — Some SNMP set commands may cause the switch to crash
with a message similar to the following.
Software exception at bcmHwVlans.c:149 -- in 'mAdMgrCtrl', task
ID=0x18636e8 -> ASIC call failed: Entry not found.
Release E.11.05
Problems Resolved in Release E.11.05 (Never released).
■
VLAN (PR_0000002103) — The alteration of the VLAN/MSTP instance mapping in the
pending configuration is not properly functioning. Any attempt to remove a single VLAN ID
(VID) from one MSTP instance and then assign it to another MSTP instance fails, though
specifying a VID range succeeds.
■
SNMP (PR_1000761379) — When an SNMP get is used to gather statistics, the first
interface on each module only updates its SNMP counters on every other query.
■
UDLD (PR_0000002473) — UDLD protocol packets received on a (non-UDLD) trunk port
are incorrectly forwarded out of same port they are received on, resulting in high CPU usage
on the switch.
■
PIM/IGMP (PR_0000005121) — The switch may intermittently fail to forward multicast
streams to their downstream multicast hosts.
159
Software Fixes
Release E.11.06
Release E.11.06
Problems Resolved in Release E.11.06 (Not a public release).
■
RADIUS Accounting (PR_0000004141) — The "Acct-Status-Type" attribute is missing in
the accounting-request to RADIUS server upon execution of the boot system CLI command.
■
RADIUS Accounting (PR_0000004139) — Procurve switches do not send the accountingrequest to a RADIUS server upon execution of the reload CLI command.
■
RADIUS Accounting (PR_0000004145) — An incomplete "Calling-Station-ID" field is sent
in the accounting-request to the RADIUS server upon execution of the boot system CLI
command.
■
GVRP/RADIUS (PR_0000006051) — RADIUS assigned VLANs are not propagated
correctly in GVRP.
Note: This fix is associated with some new switch behavior: When only one port has learned of
a dynamic VLAN, it will advertise that VLAN if an auth port has been RADIUS-assigned that
dynamic VLAN, regardless of the unknown-VLANs configuration of that port. The fix accommodates RADIUS-assigned (and hpicfUsrProf MIB-assigned) tagged VLANs as well as untagged
VLANs. These changes are enabled by default and are not configurable. This fix does not modify
any other GVRP behavior.
■
Crash (PR_0000004023) — Repeated PCM configuration scans may cause the switch to
crash with a message similar to the following.
PPC Data Storage (Bus Error) exception vector 0x300: Stack
Frame=0x07af44c0
HW Addr=0x6520463a IP=0x00965a88 Task='tSsh0' Task ID=0x7af4810fp:
0x013d97cc sp:0
■
Crash (PR_0000002270) — A switch populated with a ProCurve 4 port mini-GBIC xl
module (J8776A) may crash with an error message similar to the following:
Software exception at msgSys_drv.c:529 -- in'eDrvPoll', task ID =
0x41e9f708
■
TACACS+ (PR_0000003839) — The TACACS server configuration parameter accepts an
address from an invalid/reserved IP range: 0.0.0.1 to 0.255.255.255.
160
Software Fixes
Release E.11.07
Release E.11.07
Problems Resolved in Release E.11.07 (Never released).
■
Management (PR_0000005902) — The management functionality may become unresponsive, resulting in loss of TELNET, Web Management, and console access response from the
switch.
■
CLI (PR_0000002815/1000406763) — Output from the show tech CLI command was
modified to include output from show access-list resources and show access-list radius all
commands.
■
Trunking (PR_0000005002) — After reload of a configuration where a trunk port name
is "TRUNK=", the global trunk configuration is missing in the config, as well as the trunk’s
VLAN assignments.
■
SFTP/SCP (PR_0000008270) — SFTP/SCP will not close the "client" session after the file
transfer. The client session will need to be manually closed.
■
UDLD (PR_0000009505) — UDLD misconfiguration (where UDLD is enabled on one side
and disabled on the other) could lead to a unicast packet storm that results in MSTP running
with multiple roots.
■
TACACS (PR_0000008268) — After updating software from a version that allows invalid
IP addresses to be configured for a TACACS server to a version that does not allow it, the
invalid IP address configured can not be removed.
Release E.11.08
Problems Resolved in Release E.11.08 (Never released).
■
Enhancement (PR_0000010783) — Support is added for the following products.
J9099B - ProCurve 100-BX-D SFP-LC Transceiver
J9100B - ProCurve 100-BX-U SFP-LC Transceiver
J9142B - ProCurve 1000-BX-D SFP-LC Mini-GBIC
J9143B - ProCurve 1000-BX-U SFP-LC Mini-GBIC
■
161
Hotswap (PR_00000010695) — Hotswapping X2 (10-GbE) transceivers may either trigger
a selftest failure (reported as FFI: Port A1 self test failure in the event log), or
the transceiver type may be misreported in the software.
Software Fixes
Release E.11.09
Release E.11.09
Problems Resolved in Release E.11.09
■
Transceivers (PR_0000010525) — Intermittent self test failure may occur if transceivers
are hot-swapped in and out of the switch in too short a time frame. Note that even with this
fix, transceivers should always be allowed to fully initialize prior to their removal and
subsequent re-insertion.
Best Practice Tip: Upon hot insertion of a transceiver, the Mode LED will come on for two
seconds while the transceiver is initialized. Once the Mode LED has extinguished, it is safe to
remove the transceiver.
■
Selftest Failure (PR_0000010937) — Rarely, the switch may experience self test failure
of all the modules. Messages like the following will be visible in the event log. Re-seating the
modules may allow successful self-test to occur.
W <date/time stamp> 00374 chassis: Slot # Failed to boot-timeout(SELFTEST)
■
CLI (PR_0000009868) — Execution of a show command in one TELNET or console
session prevents successful execution of a show command in a concurrent management
(CLI) session.
Release E.11.10
Problems Resolved in Release E.11.10
■
Crash (PR_0000009910) — Switches performing PIM routing may reboot unexpectedly
with a message similar to the following.
SubSystem 0 went down: 02/09/90 11:55:12
NMI event SW:IP=0x000e2820 MSR:0x0000b032 LR:0x000de058
Task='mPimdmCtrl' Task ID=0x12c4db8 cr: 0x44800082 sp:0x012c4c70
xer:0x20000000
■
Crash (PR_0000012124) — Switches configured for meshing may reboot unexpectedly
with a message similar to the following.
Software exception at ldbal_util.c:2525 -- in 'mLdBalCtrl'
■
SNMP (PR_0000001926) — An SNMP query for the MIB ifInUnknownProtos returns
incorrect and varying results.
162
Software Fixes
Release E.11.11
■
Config (PR_0000002077) — The presence of the valid CLI/configuration parameter spanning-tree trap errant-bpdu will cause a failure to upload the configuration, with the switch
reporting an error similar to the following (In this example, the problem parameter was on
line 16 of the configuration.).
line: 16. trap: Error setting configuration.
Corrupted download file.
■
Link Failure (PR_0000015528) — Updating to software version E.11.09 may cause all
100FX and some 10/100 links to fail. There are three workarounds for this issue.
•
Configure fixed speed/duplex settings at the NIC and switch port.
•
Configure a fixed MDI/MDI-X mode.
•
Roll back to an earlier software version
Release E.11.11
The following problem was resolved in release E.11.11 (not a public release).
■
Enhancement (PR_0000008911) — This enhancement allows an SFP (mini-GBIC) slot to
be configured even when there is no SFP/Mini-GBIC installed in the slot. For more information see “Configuring Transceivers” on page 104.
Release E.11.12
The following problems were resolved in release E.11.12 (not a public release).
■
802.1X (PR_0000014842) — If an invalid number of characters are used at the CLI for the
command aaa port-access supplicant <port number> secret, the CLI returns an error message
that references the wrong port number for the supplicant being configured.
■
ACLs (PR_0000015592, PR_1000389442) — Numbering restrictions are not enforced at
the CLI; extended ACLs numbered 200 or higher are considered valid. This fix enforces ACL
numbering restrictions and converts existing ACLs numbered 200 or higher into named ACLs.
If an invalid name of form XXX is found, it will be converted to "invalidXXX".
163
Software Fixes
Release E.11.13
Note:
If you have ACLs configured with numbers greater than or equal to 200, you need to reconfigure those
ACLs with either a valid name or valid number prior to loading E.11.12 software, or it will be tagged
as invalid. For example, if you have an ACL called 222 and it is applied to a vlan, the E.11.12 script
will convert the 222 ACL to "invalid222".
■
Authentication (PR_0000011138) — If the RADIUS server becomes unavailable, the eapradius authorized option allows the switch to authenticate devices. If the response time of the
RADIUS subsystem is greater than the server-timeout value on the switch or the device
supplicant then the switch will not be able to authenticate devices, and no warning of this
failure will be displayed. This fix triggers the display of the following CLI message.
The RADIUS connection timeout must be less than the authentication
server timeout for the switch to authenticate automatically when the
RADIUS server is unavailable.
■
Authentication (PR_0000012553) — The switch sends EAP supplicant packets with the
identity field truncated to 24 bytes after a reload.
■
Controlled Directions (PR_0000009818) — The switch does not properly enable or edit
the controlled direction parameter (in the config line aaa port-access controlled-direction
<in|out|both>) in the configuration.
■
DHCP (PR_0000010341) — The DHCP retransmission delay time is not RFC compliant.
The RFC described an exponential back-off algorithm, but the switch sent a DHCP Request
packet every 4 seconds.
■
Event Log (PR_0000013980) — Connection rate filter messages in the event log display
random characters instead of the port number.
Release E.11.13
The following problems were resolved in release E.11.13 (not a public release).
■
ACLs (PR_0000015592b) — Adding to the ACL fix in E.11.12 (PR_0000015592), an accessgroup that refers to an ACL numbered 200 or higher is renamed by the E.11.13 software. For
example, if the access-group refers to ACL 222, the E.11.13 script will convert the 222 to
"unsupported222".
■
Authentication (PR_0000014177) — The switch consumes too many packets during the
AAA Authentication and dynamic VLAN assignment, potentially causing clients that require
BOOTP to fail to retrieve their configurations and initialize.
164
Software Fixes
Release E.11.14
■
Crash (PR_0000038448) — Switches configured for Web Authentication may reboot
unexpectedly in response to DHCP activity, displaying a message similar to the following.
Software exception at exception.c:621 -- in 'mAcctCtrl', task ID =
0x842d140 -> Memory system error at 0x7ed5950 - memPartFree
■
GVRP (PR_0000012224) — Changing the GVRP unknown-vlan state from 'block' to 'learn'
and vice versa stops all GVRP advertisements from that interface until the interface is
disabled and then re-enabled.
■
RADIUS Accounting (PR_0000012487) — The switch does not send an accounting-stop
when a switch reload closes the session.
Release E.11.14
The following problems were resolved in release E.11.14 (not a public release).
■
802.1X (PR_0000041041) — The switch may reach a point at which it will no longer be
able to authenticate 802.1X clients until it is reloaded. The speed at which this occurs is
dependent on the rate of 802.1X connection attempts.
■
CLI (PR_0000008217) — The copy flash CLI command does not allow the user to specify
a source OS location (primary/secondary).
■
Config (PR_0000037570) — After using the CLI to assign a port in a VLAN number higher
than 32, the configuration cannot be saved via the Menu interface.
■
Crash (PR_0000037904) — The switch may experience an unexpected reboot when MAC
based authentication occurs successfully and the switch moves the client into a dynamically
assigned VLAN. The crash message will be similar to the following.
Software exception at wma_api.c:73 -- in 'mWebAuth', task ID =
0x85d02d90
■
Crash (PR_0000039394) — The switch may reboot unexpectedly during the process of
MAC based Authentication using another switch as the client, recording a crash message
similar to the following.
Software exception at wma_vlan_sm.c:246 -- in 'mWebAuth', task ID =
0x85d017c0
■
Crash (PR_0000039959) — When a port is configured for limited-continuous learn mode
(port-security <port number> learn-mode limited-continuous), MAC-address timeouts followed
by port-access activity may cause the switch to reboot unexpectedly with a message similar
to one of the following.
NMI event SW:IP=0x005906a8 MSR:0x0000b032 LR:0x00350144
Task='m8021xCtrl'
PPC Bus Error exception vector 0x300: Task='m8021xCtrl'
165
Software Fixes
Release E.11.14
PPC Bus Error exception vector 0x300: Task='mAdMgrCtrl'
■
LEDs (PR_0000040034) — The mode LED does not function properly when it is set to
display errors (the "!" setting).
■
MAC Authentication (PR_0000011949) — MAC authentication may fail to occur unless
the switch port status is toggled.
■
MAC Authentication (PR_0000015520) — Traffic from unauthenticated clients may be
allowed during the process of authenticating clients under heavy loads.
■
MSTP (PR_0000011865) — The port priority reported by the CLI command show span
instance <x> incorrectly reports 0 for the priority instead of 128 which is the default/mean
value. This anomaly occurs only on non-IST instances. If any valid value is configured the
switch properly reports the assigned port priority value.
■
RADIUS Accounting (PR_0000017732) — RADIUS accounting is incrementing the wrong
counter in response to a dropped (invalid) packet from the RADIUS server.
■
RADIUS/Config (PR_0000013070) — The RADIUS key is lost when the configuration is
transferred off the switch using the CLI command copy running-config tftp <ip address>. This
fix involves introduction of a new configuration parameter include-credentials radius-tacacsonly. Following the addition of this statement to the configuration of the switch, any CLI copy
operations of the configuration will include the RADIUS or TACACS server credentials.
ProCurveSwitch(config)# include-credentials help
Usage: [no] include-credentials radius-tacacs-only
Description: When enabled, only RADIUS and TACACS+ server keys are
included in configuration files saved onto a remote server or
workstation. If this is not enabled (the default), then RADIUS and/
or TACACS+ keys will not be saved and authentication may not function
after restoring a backup configuration until the server key is
manually reconfigured.
■
SNMP (PR_0000017534) — SNMP communication may cease after a software update and
configuration copy to the switch.
■
Unauthenticated VLAN (PR_0000010533) — The switch allows an inherent configuration conflict; an unauthenticated VLAN (unauth-vid) can be configured concurrently for both
802.1X and Web/MAC authentication. This fix will not allow concurrent configuration of an
unauth-vid for the aaa port-access authenticator and aaa port-access web-based or aaa portaccess mac-based functions. Software versions that contain this fix will not allow this
configuration conflict at the CLI. Existing configurations will be altered by this fix, and an
error will be reported at the switch CLI and event log.
166
Software Fixes
Release E.11.14
Best Practice Tip: 802.1X should not have an unauthenticated VLAN setting when it works
concurrently with Web-based or MAC-based authentication if the unauth-period in 802.1X is zero
(the default value). Recall that the unauth-period is the time that 802.1X will wait for authentication completion before the client will be authorized on an unauthenticated VLAN. If 802.1X is
associated with an unauthenticated VLAN when the unauth-period is zero, Web- or MAC-auth
may not get the opportunity to initiate authentication at all if the first packet from the client is
an 802.1X packet. Alternatively, if the first packet sent was not 802.1X, Web- or MAC-auth could
be initiated before 802.1X places the user in the unauthenticated VLAN and when Web- or MACauth completes successfully, it will be awaiting traffic (to enable VLAN assignment) from the
client but the traffic will be restricted to the unauthenticated VLAN, and thus the client will
remain there.
If a MAC- or Web-based configuration on a port is associated with an unauth-VID, and an attempt
is made to configure an unauth-VID for 802.1X (port-access authenticator), the switch with this
fix will reject the configuration change with a message similar to one of the following.
Message 1 (when an unauth-vid config is attempted on a port with an existing Web- or MAC-auth
unauth-vid):
Configuration change denied for port <number>. Only Web or MAC
authenticator can have unauthenticated VLAN enabled if 802.1X
authenticator is enabled on the same port. Please disable Web and
MAC authentication on this port using the following commands:
no aaa port-access web-based <PORT-LIST> or
no aaa port-access mac-based <PORT-LIST>
Then you can enable 802.1X authentication with unauthenticated VLAN.
You can re-enable Web and/or MAC authentication after you remove the
unauthenticated VLAN from 802.1X. Note that you can set unauthenticated VLAN for Web or MAC authentication instead.
Message 2 (when an unauth-vid config is attempted on a port with an existing 802.1X unauth-vid):
Configuration change denied for port <number>. Only Web or MAC
authenticator can have unauthenticated VLAN enabled if 802.1X
authenticator is enabled on the same port. Please remove the
unauthenticated VLAN from 802.1X authentication on this port using
the following command:
no aaa port-access authenticator <PORT-LIST> unauth-vid
Note that you can set unauthenticated VLAN for Web or MAC
authentication instead.
Message 3:
167
Software Fixes
Release E.11.15
Configuration change denied for port <number>. Only Web or MAC
authenticator can have unauthenticated VLAN enabled if 802.1X
authenticator is enabled on the same port. Please use unauthenticated
VLAN for Web or MAC authentication instead.
Event log message when the configuration is changed:
mgr: Disabled unauthenticated VLAN on port <number> for the 802.1X.
Unauthenticated VLAN cannot be simultaneously enabled on both 802.1X
and Web or MAC authentication.
Release E.11.15
The following problems were resolved in release E.11.15 (not a public release).
■
Crash (PR_0000009820) — sFlow sampling may cause the switch to reboot unexpectedly
with a message similar to the following.
chassis: Slot H Software exception at msgSys_drv.c:529 -- in
'eDrvPoll', task ID = 0x402e118c
■
Crash (PR_0000041599) — When a configuration file is uploaded to the switch via TFTP
or SCP/SFTP, the switch crashes during attempted reload into the configuration if one or
more of the following configuration lines are present in the configuration.
snmp-server response-source <IP address>
snmp-server response-source dst-ip-of-request
snmp-server trap-source <IP address>
The switch will log a crash message similar to the following.
PPC Bus Error exception vector 0x300: Stack-frame=0x0124cc40
HW Addr=0x025aa1cc IP=0x00538808 Task='mftTask' Task ID=0 x124dcb0
fp: 0x012d5c30 sp:0x0124cd00 lr:0
■
Module Fault (PR_0000039101) — Switch modules J9001A (Switch xl Wireless EDGE
Services Module) and J8162A (Switch xl Access Controller Module) will fault if Fast Boot is
enabled and the log will report the following Major event.
HPESP: Access Controller XL Module x: incompatible BIOS version.
■
OSPF (PR_0000042138) — OSPF ECMP does not work for External 1 and 2 routes,
although ECMP works properly for inter-area routes.
Release E.11.16
The following problems were resolved in release E.11.16 (not a public release).
168
Software Fixes
Release E.11.17
■
802.1X (PR_0000039909) — 802.1X authentication appears to work, but the client cannot
communicate on the network for approximately 30 seconds.
■
CLI (PR_0000010378) — Session time (sec.) remains at zero in response to the CLI
command show port-access authenticator <port> session-counters; it should increment.
■
Command Authorization (PR_0000043525) — HP-Command-String authorization does
not work as expected.
■
Enhancement (PR_0000041022) — Enhancement to AAA accounting. For more information, see “Accounting Services” on page 107.
■
GVRP (PR_0000040758) — Switches do not use multiple GARP Information Propagation
(GIP) contexts when the switch has been configured for MSTP operation; the same GIP
context is used for all ports participating in GVRP. There should be multiple GIP contexts one for each 'spanning-tree' (the IST and each of the MSTIs).
■
PIM-DM (PR_0000042728) — With a large number of IP multicast streams (on the order
of 100), some of the streams might be dropped by the switch. The event log displays messages
similar to the following.
PIM: Failed alloc of HW Flow for flow <IP_multicast_address>
Release E.11.17
The following problems were resolved in release E.11.17 (not a public release).
■
Authentication (PR_0000044893) — When port authentication methods are in use on a
switch, if all of the clients are disconnected, the switch may change the Class of Service
(CoS) settings.
■
GVRP (PR_0000040238) — After a dynamically-learned VLAN is converted to a static portbased VLAN, and an interface is made a static member of that VLAN, disabling GVRP causes
the port to lose the VLAN membership. The running-config, startup-config and the SNMP
egress static member list for the VLAN show the port as member of the VLAN. All other data
shows the port is no longer a member of the VLAN. VLAN communication over the affected
interface is no longer possible until one of the two following workarounds is executed.
Workarounds: Either re-issue the tag and untag commands for VLAN port assignment, or
reload the system.
Release E.11.18
The following problems were resolved in release E.11.18 (not a public release).
169
Software Fixes
Release E.11.19
■
802.1X (PR_0000010850) — If an unauth-vid is configured, and the client limit is reached
on a switch port, a properly credentialed re-authentication following an improperly credentialed authentication attempt (for example, incorrect password) will leave the 802.1X client
in the unauthorized VLAN instead of applying the appropriate authorized VLAN.
■
802.1X (PR_0000047025) — After the switch reboots and before IP communication is
initialized, the switch accepts authentication requests from 802.1X clients. Because the
switch cannot communicate with the RADIUS server yet, it sends EAP-Failure notifications
to the client, which causes client authentication to fail.
■
BPDU Protection (PR_0000047748) — This fix corrects the output of an SNMP query.
Before the fix, the switch might incorrectly respond that BPDU protection is disabled on a
port, when in fact it is enabled and functioning properly.
■
DHCP Snooping (PR_0000040580) — Configuration of trust status for DHCP snooping
on ports participating in a dynamic trunk yields undesirable results when the ports of the
trunk are removed. This configuration should not be allowed on dynamic trunks (e.g. dhcpsnooping trust Dyn1), and this fix enforces that limitation at the CLI with an error message.
■
Management (PR_0000044146) — Ping and telnet to the switch fail at exactly 1243 days
of uptime.
■
UDLD (PR_0000043071) — UDLD transmits a burst of packets when any port on the
switch goes down (one packet is sent for each port that goes down), falsely triggering a
failure state.
Release E.11.19
The following problems were resolved in release E.11.19 (not a public release).
■
Authentication (PR_0000052226) — When port authentication methods are in use on a
switch, if all of the clients are disconnected, the switch may change the Class of Service
(COS) settings. This PR_0000052226 improves the Authentication fix in E.11.17 software
(PR_0000044893).
■
RADIUS Accounting (PR_0000042522) — The 'class' attribute is not included in the
accounting-request to the RADIUS server; RFC 2865 states that this should occur.
■
SSH (PR_0000014531) — Rarely, after some period of time with normal SSH connectivity,
the switch may become unresponsive to further SSH management.
Release E.11.20
The following problems were resolved in release E.11.20 (not a public release).
170
Software Fixes
Release E.11.21
■
Authentication (PR_0000053003) — After a client is authenticated by 802.1X, if the
switch receives a subsequent successful Web or MAC Authentication for that same client,
the switch overwrites the 802.1X client RADIUS attributes.
■
GVRP (PR_0000046133) — This fix improves the GVRP fix in E.11.16 (PR_0000040758).
■
Logging (PR_0000003908) — PIM errors may be inadequate for problem isolation and
troubleshooting. This fix enhances the PIM error messages with more descriptive information.
■
SNMP/Config (PR_0000043775) — The switch allows invalid configuration parameters
to be set via SNMP.
■
Unauthenticated VLAN (PR_0000045072) — An unauthenticated VLAN cannot be
configured for 802.1X authentication, when another authentication method is also in use on
a port. This fix also adds the unauth-period parameter for MAC authentication.
Release E.11.21
The following problems were resolved in release E.11.21.
■
Console (PR_0000001136) — Rarely, the switch console may hang after a software image
transfer to the switch. Workaround: <Ctrl-C> will restore the command prompt.
■
SNMP/Config (PR_0000039221) — The switch can misinterpret the community name as
if it were a trap level, in the snmp-server host command. This fix modifies the command with
keywords community and trap-level. The new command syntax is as follows.
snmp-server host <ip addr> [community <community string>] [trap-level <none | all | not-info |
critical | debug>] [informs].
■
171
UDLD (PR_0000047414) — When UDLD is enabled, communication with the switch might
be inconsistent, affecting the switch response to ping, telnet, 802.1X requests, SNMP
requests, and SNTP packets.
© 2001, 2008-2010 Hewlett-Packard Development Company, LP. The information contained
herein is subject to change without notice.
Part Number 5990-6004
June 2010